Goto

Collaborating Authors

 cybersecurity threat


Is ChatGPT a cybersecurity threat? • TechCrunch

#artificialintelligence

Since its debut in November, ChatGPT has become the internet's new favorite plaything. The AI-driven natural language processing tool rapidly amassed more than 1 million users, who have used the web-based chatbot for everything from generating wedding speeches and hip-hop lyrics to crafting academic essays and writing computer code. Not only have ChatGPT's human-like abilities taken the internet by storm, but it has also set a number of industries on edge: a New York school banned ChatGPT over fears that it could be used to cheat, copywriters are already being replaced, and reports claim Google is so alarmed by ChatGPT's capabilities that it issued a "code red" to ensure the survival of the company's search business. It appears the cybersecurity industry, a community that has long been skeptical about the potential implications of modern AI, is also taking notice amid concerns that ChatGPT could be abused by hackers with limited resources and zero technical knowledge. Just weeks after ChatGPT debuted, Israeli cybersecurity company Check Point demonstrated how the web-based chatbot, when used in tandem with OpenAI's code-writing system Codex, could create a phishing email capable of carrying a malicious payload. Check Point threat intelligence group manager Sergey Shykevich told TechCrunch that he believes use cases like this illustrate that ChatGPT has the "potential to significantly alter the cyber threat landscape," adding that it represents "another step forward in the dangerous evolution of increasingly sophisticated and effective cyber capabilities."


Ominous 2023 cybersecurity threats ensure an active landscape

#artificialintelligence

He also fears that the advancement of machine learning and artificial intelligence to fight potential cybercrime is similarly being used by …


How AI is Being Developed at OPM for Cybersecurity Threats - Cognilytica

#artificialintelligence

The evolution of cloud computing and artificial intelligence are growing in parallel, and the complexity of the cloud is driving the need for AI. In addition, the complexity of AI is also creating the need for it to work better in the cloud environment with efficiency, transparency and control. Organizations are taking a more data-driven approach, where artificial intelligence can be used to detect and proactively provide alerts on weaknesses and vulnerabilities both that are being exploited right now, or that might be exploited in the future. This is being done by analyzing data coming in and out of protected endpoints, both detecting threats based on known behavior, and spotting yet known threats based on predictive analytics. Join this interactive presentation and be sure to stick around for Q&A with Melvin!


Artificial Intelligence Is the Next Step for Smart Homes

#artificialintelligence

In recent years, homeowners have adopted smart home technologies to improve their quality of life. Connected devices and appliances perform actions, tasks, and automated routines based on a homeowner's preferences. Smart technologies enable homeowners to save time, money, and energy. Major tech companies such as Apple, Google, and Amazon have driven the adoption of smart home technologies. From digital voice assistants to intelligent thermostats and everything in between, smart homes are the homes of the future.


Machine Learning: Practical Applications for Cybersecurity

#artificialintelligence

People have embraced machine learning in different industries and sectors. Cybersecurity is one sector that has significantly benefited from it, thanks to its wide range of applications. It has helped solve some of the most common cybersecurity problems that individuals and businesses experience. Practical solutions are in high demand in an era where cybersecurity threats are soaring. Machine learning has proven to make threat detection and prediction easier.


Top 10 Mistakes When Setting-up an Artificial Intelligence Project

#artificialintelligence

Whether you are just overwhelmed with data or just curious about what you will learn, you may be feeling the impulse to jump on the artificial intelligence (AI) bandwagon. Before you go too far down the road, please consider this Top 10 list of the most common mistakes mangers make when building an AI project. This comes from long, hard lessons learned across multiple missions and IT clients over the years. Mission owners have a lot to do. It is usually the most annoying or time-intensive tasks they want to automate the most. I never begrudge someone who is trying to better optimize the cognitive talent of their team.


How AI and ML can thwart a cybersecurity threat no one talks about

#artificialintelligence

The strategic combination of a Defensive Artificial Intelligence implementation collaborated with Robotic Process Automation strategies to bring an adaptive, effective, and buzz-worthy edge to the industry.


Trustworthy AI - AI Summary

#artificialintelligence

I most appreciate AI when it augments human work and makes us stronger or more effective; when it performs tasks that we do not want to do or struggle to do, thereby freeing us to enjoy the activities we are good at and like. Remember how the introduction of the electronic spreadsheet did not make accountants or statisticians obsolete but instead gave them numerical "super-powers" that made their work easier and better? But what is critical is that companies and consumers understand how an AI algorithm uses data to make better decisions that protect all stakeholders from disappointment and harm. This means AI's decision-making process must be transparent to reinforce trust, fair to avoid bias, protective of data to ensure privacy, and vigilant against cybersecurity threats to prevent external abuse. As well as having negative implications for the consumer, the possible harm of misuse of data by AI can tarnish a company's brand, stripping away the trust that it has worked so hard to build over the years.


Why Supply Chains Are Today's Fastest Growing Cybersecurity Threat - Security Boulevard

#artificialintelligence

Language EnglishTags:  Business ecosystems have expanded over the years owing to the many benefits of diverse, interconnected supply chains, prompting organizations to pursue close, collaborative relationships with their suppliers. However, this has led to increased cyber threats when organizations expose their networks to their supply chain and it only takes one supplier to have cybersecurity vulnerabilities to bring a business to its knees. To this point governments around the world have highlighted supply chains as an area for urgent attention in tackling cyber risk in the coming years. Looking Beyond Your Own Perimeter Over the last few years, many organizations have worked hard to improve their cyber defenses and are increasingly ‘harder targets’. However, for these well-defended organizations, now the greatest weaknesses in their defenses are their suppliers, who are typically less well defended but with whom they are highly interconnected. At the same time, the cyber threat landscape has intensified, and events of the past year have meant that security professionals are not only having to manage security in a remote working set up and ensure employees have good accessibility, they are also having to handle a multitude of issues from a distance while defending a much broader attack surface. As a result, points of vulnerability have become even more numerous, providing an attractive space for bad actors to disrupt and extort enterprises. Threats have escalated, including phishing and new variants of known threats, such as ransomware and Denial of Service (DDoS) attacks, as well as increases in supply chain attacks. But where supply chains are concerned, it is nearly impossible to effectively manage this risk unless you know the state of your suppliers’ defenses and continually ensure that they are comparable to your own. Organizations must deeply understand the cyber risks associated with the relationship and try to mitigate those risks to the degree possible. However, that’s easier said than done. With the sending and receiving of information essential for the supply chain to function, the only option is to better identify and manage the risks presented. This requires organizations to overhaul existing risk monitoring programs, technology investments and also to prioritize cyber and data security governance. Ensuring the Basics are in Place At the very least organizations should ensure that both they and their suppliers have the basic controls in place such as Cyber Essentials, NIST and ISO 27001, coupled with good data management controls. They should thoroughly vet and continuously monitor supply chain partners. They need to understand what data partners will need access to and why, and ultimately what level of risk this poses. Likewise, they need to understand what controls suppliers have in place to safeguard data and protect against incoming and outgoing cyber threats. This needs to be monitored, logged, and regularly reviewed and a baseline of normal activities between the organization and the supplier should be established. As well as effective processes, people play a key role in helping to minimize risk. Cybersecurity training should be given so that employees are aware of the dangers and know how to spot suspicious activity. They should be aware of data regulation requirements and understand what data can be shared with whom. And they should also know exactly what to do in the event of a breach, so a detailed incident response plan should be shared and regularly reviewed. IT best practices should be applied to minimize these risks. IT used effectively can automatically protect sensitive data so that when employees inevitably make mistakes, technology is there to safeguard the organization. Securely Transferring Information Between Suppliers So how do organizations transfer information between suppliers securely and how do they ensure that only authorized suppliers receive sensitive data? Here data classification tools are critical to ensure that sensitive data is appropriately treated, stored, and disposed of during its lifetime in accordance with its importance to the organization. Through appropriate classification, using visual labelling and metadata application to emails and documents, this protects the organization from the risk of sensitive data being exposed to unauthorized organizations further down the line through the supply chain. Likewise, data that isn’t properly encrypted in transit can be at risk of compromise, so using a secure and compliant mechanism for transferring data within the supply chain will significantly reduce risks. Managed File Transfer (MFT) software facilitates the automated sharing of data with suppliers. This secure channel provides a central platform for information exchanges and offers audit trails, user access controls, and other file transfer protections. Layering Security Defenses Organizations should also layer security defenses to neutralize any threats coming from a supplier. Due to its ubiquity, email is a particularly vulnerable channel and one that’s often exploited by cyber criminals posing as a trusted partner. Therefore, it is essential that organizations are adequately protected from incoming malware, embedded Advanced Persistent Threats, or any other threat that could pose a risk to the business. And finally, organizations need to ensure that documents uploaded and downloaded from the web are thoroughly analyzed, even if they are coming from a trusted source. To do this effectively, they need a solution that can remove risks from email, web and endpoints, yet still allows the transfer of information to occur. Adaptive Data Loss Prevention (DLP) allows the flow of information to continue while removing threats, protecting critical data, and ensuring compliance. It doesn’t become a barrier to business or impose a heavy management burden. This is important because traditional DLP ‘stop and block’ approaches have often resulted in too many delays to legitimate business communications and high management overheads associated with false positives. Cyber Criminal Attacks Set to Rise Many of the recent well publicized attacks have been nation state orchestrated. Going forward this is going to turn into criminal syndicate attacks. Cyber criminals already have the ransomware capabilities and now all they need to do is tie this up with targeting the supply chain. Therefore, making sure you have the right technologies, policies and training programs in place should be a top priority for organizations in 2021. If you are interested in finding out more about protecting your supply chain, download our Guide: “Managing Cybersecurity Risk in the Supply Chain.” Download the Guide Additional Resources On-Demand Webinar: Managing the Cybersecurity Supply Chain Risk in File TransfersTags: Featured: 1


AI Stats News: 69% Of IT Executives Say They Cannot Respond To Cybersecurity Threats Without AI

#artificialintelligence

The recent surveys, studies, forecasts and other quantitative assessments of the health and progress of AI highlighted the role of AI in cybersecurity defense and in scoring standardized tests, the relationships between data migrating to the cloud and data modernization, lax security standards for IoT devices, and that the U.S. still leads the global race for AI domination but that China is making more rapid progress. Written essays on standardized tests in 18 states in the U.S. are currently graded by natural language processing (NLP) software ("automated essay scoring engines") with only a small percentage of students' essays--it varies between 5% to 20%--randomly selected for a human grader to double check the machine's work [VICE] Based on a 100-point scale, the U.S. leads the global AI race with 44.2 points, followed by China with 32.3 points and the European Union with 23.5 points; The U.S. came out on top in talent, research, development, and hardware, while China led in adoption and data. Airbus Americas has been using AI from AppZen to review expense reports and determine if they are in compliance with company policies; in the first partial year of the technology's implementation Airbus paid off its initial investment of $50,000 and pocketed about $50,000 more; the division expects to save $100,000 this year and at least $200,000 in 2020 in the Americas; worldwide implementation is expected to result in several millions of dollars in savings [The Wall Street Journal]