A Biden administration executive order on artificial intelligence on deck for release next week will result in governmentwide standards for agencies already using the emerging technology, a top White House official said. NIST is expected to play a key role in executing the order.
Welcome to "Cyber Fail." In this ISMG program, our experts uncover fails so we can strengthen our defenses. In this episode, we take on deepfakes, hallucinating chatbots, the fate of humanity and why you should never put your trust in a ransomware gang.
Security researchers with novel ways to make Google artificial intelligence models leak sensitive training data or otherwise misbehave can submit their findings to the internet giant's bug bounty program. The company also said Thursday that it's expanding its work on supply chain security for AI.
ChatGPT can craft almost perfect phishing emails in five minutes, nearly beating a social engineering team with decades of experience, the results of a "nail-biting" experiment by IBM showed. The "humans emerged victorious, but by the narrowest of margins," the report said.
Leading artificial intelligence experts are calling on governments and tech companies to swiftly develop safeguards for AI systems to mitigate potential existential threats posed by the technology. More capable future AI systems might "learn to feign obedience" to human directives, they say.
Generative AI facilitates on-the-job learning, empowering team members to upskill themselves as they work and ultimately strengthening an organization's overall security posture, according to Fabio Fratucello, field chief technology officer, international, at CrowdStrike.
Techno-optimistic New York City Mayor Eric Adams on Monday unveiled a plan he said can convert the notoriously bureaucratic city administration into an AI powerhouse. AI presents a "once-in-a-generation opportunity" to improve city services, the Democratic mayor said.
In the latest weekly update, editors at Information Security Media Group discuss the impact of the Israel-Hamas war on the threat landscape and the workforce, the role of the U.S. in shaping the future of AI technology, and highlights from ISMG's Financial Services Summit in New York.
Since deception technology provides early warning of potential attacks by tricking hackers into accessing fake information, can AI tools such as ChatGPT be used to create more convincing lures? That's a question Xavier Bellekens, CEO of Lupovis, put to the test - with promising results.
The U.S. needs to pass federal legislation to establish a national framework of standards and a rules of the road for AI, but first passing federal data privacy legislation is an essential foundational part of that, some witnesses told members of Congress.
In this episode of CyberEd.io's podcast series "Cybersecurity Unplugged," Alex Zeltcer of nSure.ai discusses how fraudsters access your payment information, how industrialized payment fraud attacks operate, and how nSure.ai uses discriminative AI to identify these attacks and cut their scale.
Watermarking is a core part of a White House trustworthiness initiative to bind companies into observing steps to guarantee the safety of AI products. The problem, say AI experts, is that watermarking is as likely to fail as succeed. Watermarking removal tools are available on the open internet.
Varonis CEO Yaki Faitelson is fond of saying "You can't unbreach data." In this interview, he discusses generative AI, as well as other technologies and trends and how they impact the ways enterprises view and secure their most critical data.
The EU will set up a dedicated office to oversee the implementation of the AI Act, especially by big-tech companies such as OpenAI. Dragoş Tudorache, a Romanian politician and the co-rapporteur of the AI Act, said negotiators have agreed in principle on creation of an "EU AI Office."
The use of artificial intelligence can profoundly improve operations and services across many industries, but the multifaceted relationship between AI and cybersecurity calls for new measures to address security, privacy and regulatory concerns through the right protocols and procedures.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.