How can generative AI underline the security in cybersecurity? In this post, I will go over how this technology can have a real-world impact on CISOs and their teams today. …Continue Reading: What does generative AI mean in the context of cybersecurity?
AI
What is the adversarial impact of generative AI?
Generative AI is bringing about transformations across areas of human output. As with all prior technological revolutions, it is no surprise that doomsayers have again taken center stage. Although it is our firm belief that these technologies will be an overwhelming net force for good (this is covered in other articles in this series), it is naive to think that they won’t also be used effectively by adversaries who are out to harm us…Continue Reading: What is the adversarial impact of generative AI?
The transformative power of automation and generative AI
With the rise of complex cyberattacks and a staffing shortage, cybersecurity is set to reap the rewards of AI and automation. Today’s cybersecurity leaders are already implementing AI to build more scalable programs…Continue Reading: The transformative power of automation and generative AI
Red Sift Brand Trust launches first GPT-4 powered feature, Relevance Detection
Relevance Detection is an AI-powered feature that automatically classifies the significance of identities found across sources such as DNS, WHOIS info, SSL certificates, and many others…Continue Reading: Red Sift Brand Trust launches first GPT-4 powered feature, Relevance Detection
Generative AI at work: Using policy to protect your organization is the critical first step
This 6-part Think Piece series explores some of the most pertinent themes surrounding generative AI, including privacy, education, and its role in cybersecurity, starting with policy…Continue Reading: Generative AI at work: Using policy to protect your organization is the critical first step
Computers not consultants: Say goodbye to the age of cybersecurity consultancy
In days gone by, when an organisation wanted to protect its cyber defences, the norm would be to bring in a cyber consultant or agency. Whether it was a someone-who-knew-someone-who-knew-someone kind of contact or an established name like Capita, they would act as the go-to source of cybersecurity knowledge and execute a strategy to protect…Continue Reading: Computers not consultants: Say goodbye to the age of cybersecurity consultancy