cybersecurity framework
Exploring AI-Enabled Cybersecurity Frameworks: Deep-Learning Techniques, GPU Support, and Future Enhancements
Traditional rule-based cybersecurity systems have proven highly effective against known malware threats. However, they face challenges in detecting novel threats. To address this issue, emerging cybersecurity systems are incorporating AI techniques, specifically deep-learning algorithms, to enhance their ability to detect incidents, analyze alerts, and respond to events. While these techniques offer a promising approach to combating dynamic security threats, they often require significant computational resources. Therefore, frameworks that incorporate AI-based cybersecurity mechanisms need to support the use of GPUs to ensure optimal performance. Many cybersecurity framework vendors do not provide sufficiently detailed information about their implementation, making it difficult to assess the techniques employed and their effectiveness. This study aims to overcome this limitation by providing an overview of the most used cybersecurity frameworks that utilize AI techniques, specifically focusing on frameworks that provide comprehensive information about their implementation. Our primary objective is to identify the deep-learning techniques employed by these frameworks and evaluate their support for GPU acceleration. We have identified a total of \emph{two} deep-learning algorithms that are utilized by \emph{three} out of 38 selected cybersecurity frameworks. Our findings aim to assist in selecting open-source cybersecurity frameworks for future research and assessing any discrepancies between deep-learning techniques used in theory and practice.
- North America > United States > New York > New York County > New York City (0.04)
- North America > United States > California > Santa Clara County > Palo Alto (0.04)
- Europe > Portugal > Madeira > Funchal (0.04)
- (2 more...)
- Research Report > New Finding (0.48)
- Research Report > Promising Solution (0.34)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)
From COBIT to ISO 42001: Evaluating Cybersecurity Frameworks for Opportunities, Risks, and Regulatory Compliance in Commercializing Large Language Models
McIntosh, Timothy R., Susnjak, Teo, Liu, Tong, Watters, Paul, Nowrozy, Raza, Halgamuge, Malka N.
This study investigated the integration readiness of four predominant cybersecurity Governance, Risk and Compliance (GRC) frameworks - NIST CSF 2.0, COBIT 2019, ISO 27001:2022, and the latest ISO 42001:2023 - for the opportunities, risks, and regulatory compliance when adopting Large Language Models (LLMs), using qualitative content analysis and expert validation. Our analysis, with both LLMs and human experts in the loop, uncovered potential for LLM integration together with inadequacies in LLM risk oversight of those frameworks. Comparative gap analysis has highlighted that the new ISO 42001:2023, specifically designed for Artificial Intelligence (AI) management systems, provided most comprehensive facilitation for LLM opportunities, whereas COBIT 2019 aligned most closely with the impending European Union AI Act. Nonetheless, our findings suggested that all evaluated frameworks would benefit from enhancements to more effectively and more comprehensively address the multifaceted risks associated with LLMs, indicating a critical and time-sensitive need for their continuous evolution. We propose integrating human-expert-in-the-loop validation processes as crucial for enhancing cybersecurity frameworks to support secure and compliant LLM integration, and discuss implications for the continuous evolution of cybersecurity GRC frameworks to support the secure integration of LLMs.
- Oceania > Australia > Victoria > Melbourne (0.04)
- Oceania > New Zealand > North Island > Auckland Region > Auckland (0.04)
- North America > United States > Hawaii (0.04)
- (5 more...)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)
Cybersecurity Concepts, Types, and Jobs
Cybersecurity is the overall activity of protecting computers, networks, and data from malicious electronic attacks. It is an activity that compares to physical security, a more traditional security activity that controls access to buildings or other objects in the real world. While many high-tech physical security vendors have a combination of physical and cybersecurity in their org charts, cybersecurity is an activity that focuses on protecting assets from malicious logins and code, not on property intrusion or theft. Cybersecurity is a broad concept that encompasses several specific fields of activity. There are many classification methods. For example, there is Kaspersky Lab's classification system, and Mindcore has such a system.
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)
CyberSaint Security Releases Breakthrough AI Powered Cybersecurity Management Platform
CyberSaint, Inc. today announced the release of CyberStrong(TM), a breakthrough cybersecurity cloud platform that enables organizations to manage cybersecurity as a measurable and predictable business function. CyberStrong is powered by Amazon Web Services (AWS) Cloud and AWS Artificial Intelligence (AI) services. The new offering is also hosted in the AWS NIST/FISMA regulatory compliant cloud environment. Industry experts predict that CyberStrong will revolutionize the cybersecurity industry. "Today's cybersecurity solutions are mostly disjointed point solutions, which are hard to justify, prioritize, and reconcile with each other," said Massachusetts Institute of Technology (MIT) Research Affiliate and cybersecurity expert Dr. Raphael Yahalom.
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)