Remove Authentication Remove Generative AI Remove Magazine
article thumbnail

Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources

Tenable

Where can you find a comprehensive guide of tools to secure generative AI applications? These questions are addressed in a new set of resources for AI security from the Open Worldwide Application Security Project’s OWASP Top 10 for LLM Application Security Project. Financial services and law offices rounded out the top five.

article thumbnail

Cybersecurity Snapshot: CISA Says Midnight Blizzard Swiped U.S. Gov’t Emails During Microsoft Hack, Tells Fed Agencies To Take Immediate Action

Tenable

The attack against Microsoft began in November 2023, when Midnight Blizzard – also known as Nobelium, Cozy Bear and APT29 – compromised a legacy, non-production test account that lacked multi-factor authentication protection. Already, 22% of polled organizations use generative AI for security. The rest had no opinion.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: After Telecom Hacks, CISA Offers Security Tips for Cell Phone Users, While Banks Seek Clearer AI Regulations

Tenable

General recommendations include: Use messaging applications that offer end-to-end encrypted communications for text messages, and for voice and video calls and that are compatible with both iPhone and Android operating systems. Dont use SMS as your second authentication factor because SMS messages arent encrypted.

article thumbnail

Storytelling for CIOs: From niche to bestseller

CIO

The late Richard Sykes, CIO of pharmaceuticals giant ICI in the 1990s and later a columnist for CIO magazine, famously scripted starkly different scenarios of the future of ICI for board members early in his IT role. Miguel Traquina, CIO of biometric authentication company iProov, agrees. Unsurprisingly, generative AI intervenes here.

article thumbnail

Cybersecurity Snapshot: Latest MITRE ATT&CK Update Offers Security Insights on GenAI, Identity, Cloud and CI/CD

Tenable

In addition, why AI cyberthreats aren’t impacting CISOs’ budgets. 1 - New version of MITRE ATT&CK adds guidance on generative AI, cloud threats Information about malicious use of generative AI tools. general election just months away, U.S. And much more! Advice about securing cloud environments.

article thumbnail

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Tenable

Also, how to assess the cybersecurity capabilities of a generative AI LLM. from CSO Magazine , The Register , SC Magazine and Help Net Security , as well as the videos below. Check out what’s new in NIST’s makeover of its Cybersecurity Framework. Plus, the latest guidance on cyberattack groups APT29 and ALPHV Blackcat.

article thumbnail

Cybersecurity Snapshot: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto

Tenable

Created by the Australian Cyber Security Centre (ACSC) in collaboration with cyber agencies from 10 other countries, the “ Engaging with Artificial Intelligence ” guide highlights AI system threats, offers real-world examples and explains ways to mitigate these risks.