generative AI
AI Slop is Hurting Security — LLMs are Dumb and People are Dim
Richi Jennings | | AI, AI (Artificial Intelligence), AI hallucination, AI Misinformation generative AI, artifical intelligence, Artifical Stupidity, Artificial Artificiality, Artificial Intelligence, Artificial Intelligence (AI), Artificial Intelligence (AI)/Machine Learning (ML), Artificial Intelligence Cybersecurity, artificial intelligence in cybersecurity, artificial intelligence in security, artificial intellignece, Artificial Stupidity, CVE, CVE (Common Vulnerabilities and Exposures), cybersecurity risks of generative ai, Gen AI, GenAI, genai-for-security, generative AI, generative ai gen ai, Generative AI risks, generative artificial intelligence, Large Language Model, large language models, Large Language Models (LLM), Large language models (LLMs), LLM, LLM Platform Abuse, llm security, SB Blogwatch, Seth Larson
Artificial stupidity: Large language models are terrible if you need reasoning or actual understanding ...
Security Boulevard
D3 Is Hyperautomation, Generative AI, and SOAR, All in One
Walker Banerd | | Cybersecurity, generative AI, hyperautomation, Security Automation, Smart SOAR, SOAR
How D3’s AI-driven platform conbines hyperautomation, generative AI, and SOAR to save time, reduce errors, and boost efficiency. The post D3 Is Hyperautomation, Generative AI, and SOAR, All in One appeared first ...
Google Uses Its Big Sleep AI Agent to Find SQLite Security Flaw
Google researchers behind the vendor's Big Sleep project used the LLM-based AI agent to detect a security flaw in SQLite, illustrating the value the emerging technology can have in discovering vulnerabilities that ...
Security Boulevard
Transforming enterprises with generative AI: Pallavi Nargund’s keynote at ADDO
Generative artificial intelligence (AI) is transforming industries, enabling businesses to harness the power of machine learning (ML) to reshape customer experiences and revolutionize software development ...
Revolutionizing software development: Frank Roe’s keynote at ADDO
The world of software development is rapidly evolving, driven by increasing pressure to deliver faster, yet with fewer resources, and the widespread adoption of generative AI tools ...
Navigating new regulations and the role of SBOMs in software security
Recently in our webinar series with Amazon Web Services (AWS) and Fortify by OpenText™, our third installment, "The Power of SBOMs: Regulations Looming," brought the panel together to discuss the evolving role ...
Why NTIA Support of Open-Source AI is Good for Security
A fully open model — one where the training data is available for inspection and modification — provides a means for addressing another threat: malicious or accidentally bad training data ...
Security Boulevard
Broadcom Extends VMware Cybersecurity Portfolio
Broadcom today at the VMware Explore 2024 conference extended its VMware vDefend portfolio to include generative artificial intelligence (AI) capabilities in addition to extending its software-defined edge computing portfolio to provide deeper ...
Security Boulevard
Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Barry Strauss | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...
Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Stephen Kowski | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...