attackers, defenders, AI, AI-generated, adversarial attacks, ML

AI’s Role in Cybersecurity for Attackers and Defenders in 2024

As AI becomes available and robust, malicious actors have already used it to develop more advanced attack methods; defenders must also leverage AI in 2024 ...
Security Boulevard
SEC rules, cybersecurity, SEC cyber data breach rules

Why Biden’s EO on AI Conflates the Role of Red-Teaming

The AI executive order's broad language, particularly the role of red-teaming, prompts doubts about its practical implementation and effectiveness ...
Security Boulevard

Charting The Future: White House Rolls Out a Landmark AI Executive Order

Introduction Artificial Intelligence (AI) has shown immense potential in transforming the way businesses and industries have traditionally operated due to its immense capabilities and scalability, especially since the introduction of Generative AI ...
vulnerability PixieFail network bug

The President’s EO on AI – What it Does and Why it Won’t Work

President Biden's EO lacks the effect of law, does not mandate much of anything and overlooks some of the trickiest AI issues ...
Security Boulevard
budget open source supply chain cybersecurity ransomware White House Cyber Ops

What the White House’s Cybersecurity Strategy Means for CISOs

Cybersecurity is a huge concern. Businesses and individuals stand to lose a lot of time and money in the event of an unauthorized exposure or corruption of sensitive data. And lately, these ...
Security Boulevard
OpenText OCSF WhiteSource Log4j window Proofpoint Open Source Security

Has the Altruism Model of Open Source Security Peaked?

With an executive order, the Biden administration attempted to address concerns around open source software’s security. In Section 4 of Executive Order 14028, Improving the Nation’s Cybersecurity, open source and the software ...
Security Boulevard

Webinar: Aligning Your SBOM with the Executive Order

A Software Bill of Materials – better known as an SBOM – can enhance your compliance posture. But how do you structure and operationalize it to ensure that it is helping with ...

Ensure Your SBOM Enhances Compliance With Our Guide

Failing to comply with software licensing agreements can cost you. This is one of many arguments – particularly in the financial realm – that motivate organizations to be in compliance  – and a ...
When History Repeats | Insider Risk Lessons from Pentagon Leaks

When History Repeats | Insider Risk Lessons from the Pentagon Leaks

The arrest of a junior US air national guardsman for taking and sharing classified military intelligence is less a story about data theft or even war. It’s a story about how sensitive ...
SEC rules, cybersecurity, SEC cyber data breach rules

Senate Committee Passes Securing Open Source Software Act

Cybersecurity is a hot topic in Washington, D.C., right now. The Biden administration has released a number of executive orders around national cybersecurity edicts, and now the Senate has proposed a rare ...
Security Boulevard