zero trust
The Age of Sensorial Zero Trust: Why We Can No Longer Trust Our Senses
In a world where deepfakes and cloned voices are emerging as sophisticated attack vectors, organizations require a new security mindset: Sensorial Zero Trust [9]. This article presents a scientific analysis of the need to systematically doubt information perceived through the senses, establishing rigorous verification protocols to mitigate the risks of fraud based on generative artificial intelligence. Key concepts, such as Out-of-Band verification, Vision-Language Models (VLMs) as forensic collaborators, cryptographic provenance, and human training, are integrated into a framework that extends Zero Trust principles to human sensory information. The approach is grounded in empirical findings and academic research, emphasizing that in an era of AI-generated realities, even our eyes and ears can no longer be implicitly trusted without verification. Leaders are called to foster a culture of methodological skepticism to protect organizational integrity in this new threat landscape.
- South America > Brazil (0.14)
- North America > United States > Maryland > Montgomery County > Gaithersburg (0.04)
- Asia > Middle East > UAE (0.04)
- (3 more...)
Zero Trust Pioneer John Kindervag Joins Traceable AI as an Advisor
Traceable AI, the industry's leading API security company, today announced that John Kindervag, known for creating the Zero Trust Model for cybersecurity, will be joining Traceable as an advisor. As one of the world's foremost cybersecurity experts, Kindervag will be deeply involved in the product strategy for Traceable's API Security Platform, as well as helping Traceable educate the market on the urgency of prioritizing API security. Kindervag, who currently serves as SVP, Cybersecurity Strategy, and Global Fellow at ON2IT, is the first in a series of experts to support Traceable's mission to revolutionize the API security market. "APIs offer companies an unprecedented opportunity to drive economic growth," shared Kindervag. "But most people don't understand how they work or why they essentially offer hackers the most direct route to the sensitive data they're seeking. Traceable understands both the economic potential as well as the danger that APIs present for organizations and their customers, and I'm excited to work with them on bringing API security to the forefront of the industry's priorities."
Koverse, an SAIC Company, Introduces Industry's Only Zero Trust Data Platform
Koverse, Inc., an SAIC company, announced availability of Koverse Data Platform (KDP) 4.0, a security-first data platform that introduces attribute-based access controls (ABAC) to enforce Zero Trust for data, allowing customers to safely work with complex and sensitive information to power the most demanding analytics, data science, and AI use cases. KDP 4.0 creates an incredibly flexible, unified security model across data at the dataset and record level, increasing the value and utilization of all data within an organization, particularly of mixed sensitivities, by delivering fine-grained control to ensure authorized use. "A security-focused approach to data management ensures that organizations are extracting the most value possible from data" "We know the challenges that security-conscious government organizations and highly regulated industries struggle with when using complex and sensitive data," said Jon Matsuo, President and CEO of Koverse. "We understand that often the most sensitive data is the most valuable, yet security and privacy create barriers to use. To that end, we created a platform that enables organizations to use data safely, with security top of mind, for critical mission agility."
- Information Technology > Security & Privacy (1.00)
- Information Technology > Data Science > Data Mining > Big Data (0.83)
- Information Technology > Artificial Intelligence > Machine Learning (0.69)
How AI could help South Africa fight corruption.
"Given the large swathes of data we currently have access to, there are potential solutions to many deep-seated issues, including corruption," says Professor Tshilidzi Marwala,the UJ's Vice-Chancellor and Principal. In an extreme case, Zero Trust, an anti-corruption AI system in China, has been used to monitor and evaluate the lifestyles of government officials. It has access to more than 150 protected databases in central and local governments and, since 2012, has uncovered 8,721 government employees engaged in embezzlement, abuse of power, misuse of government resources and nepotism. Zero Trust has come under fire for not explaining the process behind identifying corrupt individuals. And it still heavily relies on humans, which could make much of its work invalid if these people are also unscrupulous.
- Africa > South Africa (0.40)
- Asia > China (0.31)
Is fraud-busting AI system being turned off for being too efficient?
What would you do if you had a machine to catch a thief? If you were a corrupt Chinese bureaucrat, you would want to ditch it, of course. Resistance by government officials to a groundbreaking big data experiment is only one of many challenges as the Chinese government starts using new technology to navigate its giant bureaucracy. According to state media, there were more than 50 million people on China's government payroll in 2016, though analysts have put the figure at more than 64 million – slightly less than the population of Britain. To turn this behemoth into a seamless operation befitting the information age, China has started adapting various types of sophisticated technology.
- Europe > United Kingdom (0.25)
- Asia > China > Hunan Province (0.06)
- Asia > China > Shanghai > Shanghai (0.05)
- (2 more...)
Het vizier op de tech industrie
With each passing year, the CISO's job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of their IT infrastructures mean that the attack surface for hackers and malicious insiders is increasing as well. Combined with the recent political developments such as the rise of state-sponsored attacks, new surveillance laws, and harsh privacy regulations, security professionals now have way too many things on their hands that sometimes keep them awake at night. Should you invest in CEO fraud protection or work harder to prepare for a media fallout after a data breach? The skills gap problem is often discussed by the press, but the journalists usually focus more on the lack of IT experts which are needed to operate complex and sprawling cybersecurity infrastructures.
- Law (1.00)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.58)
5 takeaways on the state of AI from Disrupt SF
The promise of artificial intelligence is immense, but the roadmap to achieving those goals still remains unclear. Onstage at TechCrunch Disrupt SF, some of AI's leading minds shared their thoughts on current competition in the market, how to ensure algorithms don't perpetuate racism and the future of human-machine interaction. The meteoric rise in China's focus on AI has been well-documented and has become impossible to ignore these days. With mega companies like Alibaba and Tencent pouring hundreds of millions of dollars into home-grown businesses, American companies are finding less and less room to navigate and expand in China. AI investor and Sinnovation CEO Kai-Fu Lee described China as living in a "parallel universe" to the U.S. when it comes to AI development.
- Asia > China (0.68)
- North America > United States > California > San Francisco County > San Francisco (0.35)
- North America > United States > Florida > Broward County > Fort Lauderdale (0.05)
- Information Technology > Security & Privacy (0.49)
- Law > Civil Rights & Constitutional Law (0.37)