The Asia-Pacific region will dramatically increase its investment in offensive and security tools over the next decade, amid a worsening threat landscape and rising losses, experts predict. Telemetry data from IBM and BlackBerry highlights a sharp rise in attacks against organizations in the region.
AI is being used "by everyone" these days, including by malicious nation-state actors, and that is raising the level of threats and risks facing hospitals and other healthcare entities, said John Riggi, national adviser for cybersecurity and risk at the American Hospital Association.
The Cybersecurity and Infrastructure Security Agency is requiring federal agencies to patch Linux devices on their networks and urging private sector organizations to do the same after security researchers observed threat actors exploiting a new vulnerability on many major Linux distributions.
The Australian government says it will mandate ransomware reporting by businesses, boost law enforcement capacity and fund startups with innovative cybersecurity solutions under a strategy unveiled Monday. "We cannot continue as we have," said Cyber Security and Home Affairs Minister Clare O'Neil.
European electoral and cybersecurity authorities on Tuesday held a joint exercise assessing plans to hold an incident-free election, weeks after trading bloc cybersecurity agency ENISA said the election is at risk from deepfake images and videos.
Governments across Asia are raising concerns over growing misuse of artificial intelligence as adoption of AI technology surges. With organizations racing to exploit the latest AI capabilities, government leaders also want them to address AI-enabled cybercrime, AI bias and hallucinations.
With many organizations rapidly embracing AI and ML, CISOs must meet the cybersecurity and privacy challenges of adopting these technologies head on. Shailendra Kothavale, chief compliance and risk officer at Aditya Birla Sun Life Insurance, discussed the challenges and threats ahead.
Threat detection is a data-intensive process, and AI and machine learning technologies can help security teams gain insights faster. But to get the most out of AI and ML, Kotak Securities CISO Girish Dixit advised organizations to create AI models tailored to the organization's nuances.
Over the past two decades, GreyOrange's Krishnamurthy Rajesh has seen major advancements in IT and OT technologies, with the rise of Industry 4.0, 5G wireless connections, the cloud and now AI and machine learning. These technologies increase risk, but the industry's cyber maturity is improving.
The nonprofit behind ChatGPT reinstated co-founder Sam Altman as its chief executive following a tumultuous 106 hours that saw OpenAI burn through two interim CEOs. Most of the board members responsible for firing Altman on Friday gave up their director positions to get him back.
As digitization, tools, and the attack surface increase — all against the backdrop of a global shortage of cyber talent — the need to reduce risk in an organization has never been more evident.
Exciting advancements in medicine through the use of AI are already happening, and many more are in the pipeline. But they need to be approached carefully and vetted properly for risk, said Dr. Eric Liederman, medical informatics and national privacy and security leader at Kaiser Permanente.
The Federal Trade Commission voted unanimously to approve the use of civil investigative demands for investigations related to the use of artificial intelligence, after a White House executive order on AI tasked the commission with policing competition and protecting consumers.
A report from the global financial services company Moody’s Corp. says the Industrial and Commercial Bank of China may suffer reputational damage to its financial services subsidiary after the unit was hit with a ransomware attack from the notorious Russian-linked cybercriminal group LockBit.
The hacktivist group SiegedSec has taken responsibility for a massive data breach targeting Idaho National Laboratory, a leading nuclear energy testing lab. Concerns are now growing over what data was stolen from the laboratory - and who might have access to it.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.