news analysisAI agents can find and exploit known vulnerabilities, study showsIn a somewhat chilling revelation, AI agents were able to find and exploit known vulnerabilities, but only under certain conditions, which researchers say indicates they're not close to being a significant threat – yet.By Maria KorolovJul 02, 20247 minsZero-day vulnerabilityGenerative AIVulnerabilities news Microsoft warns of novel jailbreak affecting many generative AI modelsBy Shweta SharmaJun 27, 20244 minsGenerative AIVulnerabilitiesnews Meta delays launch of Meta AI in Europe over disagreement with regulatorsBy Lynn GreinerJun 17, 20243 minsRegulationData PrivacyGenerative AI newsMicrosoft delays Recall launch amid privacy concernsBy Matthew Finnegan Jun 14, 20241 minWindows SecurityGenerative AIData and Information Security newsCriminals, too, see productivity gains from AIBy Lynn Greiner Jun 12, 20246 minsGenerative AIThreat and Vulnerability Management newsComplaints in EU challenge Meta’s plans to utilize personal data for AIBy Prasanth Aby Thomas Jun 06, 20244 minsRegulationData PrivacyGenerative AI featureUnauthorized AI is eating your company data, thanks to your employeesBy Grant Gross Jun 05, 20247 minsData PrivacyGenerative AIIT Governance newsBug in EmbedAI can allow poisoned data to sneak into your LLMsBy Shweta Sharma May 31, 20243 minsGenerative AIVulnerabilities newsOpenAI accuses Russia, China, Iran, and Israel of misusing its GenAI tools for covert OpsBy Gyana Swain May 31, 20244 minsGenerative AI ArticlesnewsMicrosoft Azure’s Russinovich sheds light on key generative AI threatsGenerative AI models have a larger attack surface than many CSOs might think. Microsoft Azure’s CTO walked through some of the more significant challenges facing developers and defenders.By David Strom May 22, 2024 4 minsGenerative AIData and Information SecuritynewsPalo Alto launches AI-powered solutions to fight AI-generated cyberthreats The suite is powered by Palo Alto’s proprietary solution, Precision AI, which integrates machine learning, deep learning, and generative AI technologies.By Prasanth Aby Thomas May 09, 2024 3 minsGenerative AISecurity SoftwarenewsSecuriti adds distributed LLM firewalls to secure genAI applicationsThe new offering is aimed at protecting against prompt injection, data leakage, and training data poisoning in LLM systems. By Shweta Sharma Apr 30, 2024 4 minsGenerative AInewsTop cybersecurity product news of the weekNew product and service announcements from Forcepoint, Ionix, Amplifier Secutiry and Torq.By CSO staff Apr 26, 2024 81 minsGenerative AISecurityfeatureKeeping up with AI: OWASP LLM AI Cybersecurity and Governance ChecklistOWASP’s checklist provides a concise and quick resource to help organizations and security leaders deal with generative AI and LLMs.By Chris Hughes Mar 14, 2024 10 minsGenerative AISecurity PracticesOpen SourcenewsMicrosoft reveals general availability of Copilot for SecurityAvailable worldwide on April 1, Microsoft Copilot for Security uses generative AI to provide incident summaries, step-by-step remediation guidance, and reverse-engineering of scripts.By Samira Sarraf Mar 13, 2024 4 minsGenerative AIThreat and Vulnerability ManagementfeatureGenerative AI poised to make substantial impact on DevSecOpsGenerative AI could be the holy grail of DevSecOps, from writing secure code and documentation to creating tests. But it could be a major point of failure if not used correctly.By Maria Korolov Mar 11, 2024 12 minsDevSecOpsGenerative AIfeatureHow gen AI helps entry-level SOC analysts improve their skillsBy automating repetitive triage and documentation tasks, generative AI systems allow entry-level security analysts to spend more time on investigations, response, and developing core skills.By Maria Korolov Mar 05, 2024 14 minsGenerative AISecurity Operations CenternewsCloudflare adds new WAF features to prevent hackers from exploiting LLMsAdded to Cloudflare’s Web Application Firewall (WAF) offerings, Firewall for AI is designed to prevent the exploitation of AI models, specifically generative AI.By Shweta Sharma Mar 04, 2024 3 minsGenerative AISecurity SoftwarenewsGenerative AI making big impact on security pros, to no one's surpriseCybersecurity professionals expressed a wide range of opinions on the pros and cons of generative AI in a new survey from a prominent certification group.By Jon Gold Feb 23, 2024 3 minsGenerative AICareersnewsNation-state threat actors using LLMs to boost cyber operationsMicrosoft and Open AI detail how some nation-state actors have started to use large language models to gather intelligence.By Samira Sarraf Feb 14, 2024 6 minsAdvanced Persistent ThreatsGenerative AIfeatureWill generative AI kill KYC authentication?Generative AI can create fake documents and personal histories that fool common know-your-customer authentication practices.By Evan Schuman Feb 14, 2024 8 minsAuthenticationFinancial Services IndustryFraud Show more Show less View all Resources whitepaper Download our unified endpoint management (UEM) vendor comparison chart Unified endpoint management (UEM) platforms now dominate the enterprise mobility space. Our chart lets you quickly compare features and functions from eight top vendors. The post Download our unified endpoint management (UEM) vendor comparison chart appeared first on Whitepaper Repository –. By Foundry Editorial 03 Jul 2024Mobile Device ManagementSecurityUniversal Endpoint Management whitepaper How OpenTelemetry Builds a Robust Observability Practice By Splunk 02 Jul 2024Business OperationsData ManagementVendor Management whitepaper Empower Engineers with Unified Observability By Splunk 02 Jul 2024Business OperationsIT ManagementMulti Cloud View all Video on demand videoAI and Cybersecurity: Speed Bumps, Training, and CommunicationIf you are hesitant to embrace AI tools because of cybersecurity concerns, don’t miss this illuminating presentation from Dennis Legori who will explain why the risk of not using AI is greater than the risk of using it. What guardrails should you have in place to ensure AI is used for good and not creating unnecessary risk? How should you be thinking about completing a privacy impact analysis and risk assessment as your use of AI tools evolves? How can security leaders add speed bumps and education to provide caution and risk mitigation as needed? Dennis will share his perspective around these and other important issues you need to consider as you widely adopt AI tools in your organization. Nov 06, 2023 17 minsCyberattacksGenerative AI Generative AI a hot topic at Black Hat Sep 06, 2023 27 minsGenerative AIEventsCybercrime How ChatGPT can help hackers, but also defend against them Sep 01, 2023 39 minsGenerative AIHacking See all videos Explore a topic Application Security Business Continuity Business Operations Cloud Security Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Hiring Industry Internet of Things IT Leadership Network Security View all topics All topics Close Application Security Business Continuity Business Operations Cloud Security Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Hiring Industry Internet of Things IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me moreLatestArticlesPodcastsVideos feature How CISOs can protect their personal liability By Ericka Chickowski Jul 03, 202413 mins CSO and CISOEmployee Protection news Cisco patches actively exploited zero-day flaw in Nexus switches By Lucian Constantin Jul 02, 20243 mins Threat and Vulnerability ManagementZero-day vulnerabilityNetwork Security news analysis US Supreme Court ruling will likely cause cyber regulation chaos By Cynthia Brumfield Jul 02, 20249 mins CSO and CISORegulationGovernment podcast CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO podcast CSO Executive Session India with Mrinal Kanti Roy, CISO, Cairn Oil and Gas Jul 01, 202416 mins CSO and CISO podcast CSO Executive Sessions India with Hilal Lone, CISO, Razorpay Jun 11, 202429 mins CSO and CISO video CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO video CSO Executive Session India with Mrinal Kanti Roy, CISO, Cairn Oil and Gas Jul 01, 202416 mins CSO and CISO video CSO Executive Session India with Hilal Lone, CISO, Razorpay Jun 11, 202429 mins CSO and CISO