With the rush to adopt large language models, companies have not thought through all of the security implications to their businesses. Two groups of researchers tackle the questions.
| LATEST SECURITY FEATURES & COMMENTARY | Researchers Map AI Threat Landscape, Risks With the rush to adopt large language models, companies have not thought through all of the security implications to their businesses. Two groups of researchers tackle the questions. Airline Gets SASE to Modernize Operations Cathay, a travel lifestyle brand that includes the Cathay Pacific airline, had a growing cybersecurity problem made worse by its aging technology infrastructure. It solved part of the problem by replacing legacy technology with a modern one that has security built in. Apple's Anti-Theft Security Slows Down iPhone Crooks The new iOS update includes Stolen Device Protection, which limits what users can do on their iPhones when away from known locations to prevent criminals from making unauthorized changes. Hook Younger Users With Cybersecurity Education Designed for Them Security should not be treated as one-size-fits all, and that is doubly true when it comes to security awareness education. Training should be customized by age, learning styles, and preferred media if it is to be effective. Move Fast and Break the Enterprise With AI The tantalizing promise of true artificial intelligence, or at least decent machine learning, has whipped into a gallop large organizations not built for speed. Time to Secure Cloud-Native Apps Is Now While the challenges and risks associated with securing cloud-native environments are significant, with the right security measures and a focus on cybersecurity basics, organizations can effectively secure their cloud-native systems and development pipelines. Prompt Security Launches With AI Protection for the Enterprise The startup, which announced $5 million in seed funding, secures enterprises against the risks generative AI brings. MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY | | | PRODUCTS & RELEASES | Panorays Study Finds 94% of CISOs Are Concerned About Third-party Cyber Threats, Yet Only 3% Have Implemented Security Measures SecurityScorecard Launches MAX Darktrace and Garland Technology Collaborate to Help Businesses Secure Operational Technology Environments Peters and Braun Introduce Bipartisan Bill to Bolster Government's Cybersecurity Capabilities Nozomi Networks Delivers Multi-Spectrum Wireless Security Sensor for Global OT and IoT Environments MORE PRODUCTS & RELEASES |
| | | | | FEATURED REPORTS | Passwords Are Passe: Next Gen Authentication Addresses Today's Threats What Ransomware Groups Look for in Enterprise Victims Ransomware attackers cast a wide net -- they just care about causing damage, making money, and gaining new victims. That means no organization is automatically immune to attack just because of its size or industry. Organizations need to take steps ... How to Use Threat Intelligence to Mitigate Third-Party Risk The report discusses the various steps of a continuous third-party intelligence lifecycle: Data collection, Data classification, Data storage, Data analysis, reporting, dissemination, continuous monitoring, data governance, and choosing the right technology stack. The report also includes information about how attackers ... | View More Dark Reading Reports >> |
|
|
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|