Security News

About Bruce Schneier I am a public-interest technologist, working at the intersection of security, technology, and people. I've been writing about security issues on my blog since 2004, and in my monthly newsletter since 1998.

In an era of relentless cybersecurity threats and rapid technological advancement, staying ahead of the curve is not just a necessity, but critical. SANS Institute, the premier global authority in cybersecurity training, is thrilled to announce Network Security 2024, a landmark event designed to empower cybersecurity professionals with groundbreaking skills, knowledge and insights.

In this Help Net Security interview, Kojin Oshiba, co-founder of Robust Intelligence, discusses his journey from academic research to addressing AI security challenges in the industry. What motivated you to specialize in the security aspects of AI systems?

Meanwhile company employees are using generative AI applications which collect and process sensitive data on a weekly basis - often without the knowledge or consent of the IT department. You can hear how in this series of on demand videos presented by senior Palo Alto Networks executives.

AI models require vast datasets to function optimally, but unrestricted data usage can lead to significant security breaches. Companies must ensure that only relevant, non-sensitive data is fed into AI systems to prevent unauthorized access and misuse.

Highlighting growth of phishing and digital scams targeting United States citizens, Bolster released a research that identified 24 separate nation-state threat actor groups attempting to exploit rising political tensions across the US to interfere with the 2024 presidential election. "We know the frequency of phishing attacks is increasing, as hackers utilize AI to execute more scams than ever before. In fact, phishing scams are being hosted in the US at a rate of nearly double, compared to 2023. The trend is only accelerating. In May alone, we logged a daily average of more than 45K malicious phishing sites," said Abhilash Garimella, VP of Research at Bolster.

Many organizations have turned to AI to alleviate their SOC analysts' load, but some cybersecurity workers fear that there may come a time when AI will steal their jobs. When trained specifically on cybersecurity data, it can streamline cybersecurity operations by automating routine tasks like triaging alerts, analyzing logs, and conducting vulnerability scans, saving valuable time and resources for human analysts.

In this Help Net Security video, Beth Miller, Field CISO at Code42, highlights a significant trend: 73% of life sciences companies turn to AI to address the cybersecurity skills gap, surpassing...

The report provides a comprehensive look at the challenges and opportunities as organizations strive to build a secure and efficient industrial networking foundation. "Operational technology, and specifically the network supporting industrial operations, has become a key differentiator for organizations globally," said Vikas Butaney, SVP and GM, Cisco Networking - SD-WAN, Multicloud and Industrial IoT. "This research spotlights how IT and OT leaders recognize that strengthening their OT security posture is critical to drive business resiliency, improve efficiencies and prepare for the next wave of innovation with AI," Butaney continued.

It's a DARPA project that aims to develop machine-learning tools that can automate the conversion of legacy C code into Rust. "You can go to any of the LLM websites, start chatting with one of the AI chatbots, and all you need to say is 'here's some C code, please translate it to safe idiomatic Rust code,' cut, paste, and something comes out, and it's often very good, but not always," said Dan Wallach, DARPA program manager for TRACTOR, in a statement.