Subscribe to Cybertalk’s RSS (Really Simple Syndication) feeds to get news delivered directly to your desktop!
AI data security: 8 essential steps for CISOs in the age of generative AI
![Data science, big data, cyber security concept art](https://www.cybertalk.org/wp-content/uploads/2024/07/shutterstock_2284126663.jpg)
EXECUTIVE SUMMARY: Artificial intelligence and large language models are transforming how organizations operate. They’re also generating vast quantities of data – including synthetic text, code, conversational data and even multi-media content. This introduces increased potential for organizations to encounter hacking, data breaches and data theft. This article outlines eight essential steps that cyber security stakeholders […]
EU says Elon Musk’s X allowed disinformation to run wild
![Elon Musk's Twitter/X platform](https://www.cybertalk.org/wp-content/uploads/2024/07/shutterstock_2337605365.jpg)
EXECUTIVE SUMMARY: The tech media mogul’s platform is the first to see charges under a new EU social media law. The European Union is taking Elon Musk to task over his transformation of the Twitter social media site (now X) into a haven for disinformation and dubious content. On Friday, the EU Commission formally charged […]
Infostealers: What are they & far-reaching effects on data security
![Hendrik de Bruin, Security Engineer, Office of the CTO](https://www.cybertalk.org/wp-content/uploads/2024/03/COVER-1021-x-638-2-copy-1.jpg)
By Hendrik De Bruin, Security Engineer, Check Point Software Technologies. Infostealers…ransomware’s lesser-known cousin When it comes to malware, ransomware usually steals the limelight, largely because of the direct, devastating impact that ransomware often causes. However, ransomware’s lesser-known cousin, the “infostealer,” is slowly but surely gaining ever-more attention. Over the last few years, we have noticed […]
5 CISO trends to keep up with during July of 2024
![Cyber security news for executives: July 2024 trends](https://www.cybertalk.org/wp-content/uploads/2024/07/shutterstock_771354805.jpg)
EXECUTIVE SUMMARY: What is the word ‘agile’ spelled backwards? CISO. (Just kidding, but it should be) As we enter July of 2024, contending with the current cyber security landscape demands unprecedented levels of vigilance and strategic agility. This month brings a convergence of developments and challenges with far-reaching implications. From a high-impact vulnerability in ubiquitous […]
Transforming network security | Three ways AI can boost infrastructure operations
![Ulrica de Fort Menares, VP of Product Management for Infrastructure Assurance, BlueCat Networks](https://www.cybertalk.org/wp-content/uploads/2024/07/Fort-Menares-cover-1021x638-1.jpg)
By Ulrica de Fort-Menares, Vice President of Product Management for Infrastructure Assurance at BlueCat Networks Artificial intelligence (AI) has the power to reshape how you operate your network security infrastructure. Firewalls have been a first line of defense in network security for many years and must always be operational. Maintaining five nines, or service availability […]
How to evolve security, if employees can’t outsmart AI-powered phishing
![Phishing and AI abstract concept art](https://www.cybertalk.org/wp-content/uploads/2024/07/shutterstock_2201543979.jpg)
EXECUTIVE SUMMARY: Until recently, the signs of a phishing scam were relatively obvious – typos, “dear”, clumsy grammar, a cloying sense of urgency. Not only did people know what to watch for, but they also felt confident in their abilities to detect a phishing email and to avoid a malicious link or attachment. But new […]
Protecting your brand in the age of AI
![Mark Dargin, Strategic Security Advisor, Optiv](https://www.cybertalk.org/wp-content/uploads/2024/07/Mark_Dargin_1024x638.jpg)
Mark Dargin is an experienced security and network architect/leader. He is a Senior Strategic Security Advisor, advising Fortune 500 organizations for Optiv, the largest pure-play security risk advisory organization in North America. He is also an Information Security & Assurance instructor at Schoolcraft College in Michigan. Mark holds an MS degree in Business Information Technology […]
Skeleton Key AI attacks unlock malicious content
![Neon digital skull, cyber security concept art, Skeleton Key attacks](https://www.cybertalk.org/wp-content/uploads/2024/07/shutterstock_2409830925.jpg)
EXECUTIVE SUMMARY: A newly discovered jailbreak – also known as a direct prompt injection attack – called Skeleton Key, affects numerous generative AI models. A successful Skeleton Key attack subverts most, if not all, of the AI safety guardrails that LLM developers built into models. In other words, Skeleton Key attacks coax AI chatbots into […]
10 daunting cyber physical attacks (and proactive mitigations)
![Cyber physical attacks concept art](https://www.cybertalk.org/wp-content/uploads/2024/06/Shutterstock_2292270999-1.jpg)
EXECUTIVE SUMMARY: Cyber physical attacks, which weaponize computer code to cause physical disruption or destruction, represent a growing threat, worldwide. These types of attacks tend to target water treatment facilities, power plants, transportation services, and other digitally connected, critical infrastructure-related segments of our society. Years ago, cyber systems and physical systems had little-to-no interconnectivity. However, […]
New MOVEit Transfer vulnerabilities that require patching (2024)
![Progress Software's MOVEit Transfer vulnerabilities, June 2024](https://www.cybertalk.org/wp-content/uploads/2024/06/shutterstock_2351986291.jpg)
EXECUTIVE SUMMARY: Remember last year’s MOVEit meltdown? Get ready for a reprise… For anyone who missed last year’s madness, MOVEit Transfer is a popular managed file transfer product sold by Progress Software, which provides business applications and services to more than 100,000 organizations globally. In 2023, the software code for the MOVEit Transfer product was […]
How one MSSP’s success story is supported by Check Point
![Jason Whitehurst, Chairman and CEO, FutureSafe Incorporated](https://www.cybertalk.org/wp-content/uploads/2024/06/JW_FutureSAfe_Cybertalk_Cover_Banner-image-002.jpg)
Jason Whitehurst is the Chairman and CEO of FutureSafe Incorporated. For over eight years, he has been a cyber security services and stack provider in the Managed Service Provider (MSP) space. Jason contributes regularly to large MSP communities as an Evangelist, advocating for the use of Managed Security Services Provider (MSSP) partnerships when selling cyber […]
5 underappreciated benefits of AI in cyber security
![Benefits of artificial intelligence to know about as you plan and purchase your AI-powered cyber security solutions](https://www.cybertalk.org/wp-content/uploads/2024/06/shutterstock_2422220481.jpg)
EXECUTIVE SUMMARY: The benefits of AI in cyber security are phenomenal, yet not sufficiently well-known. In this article, get insights that cut through the noise; that show you how to put AI to work in ways that will yield worthwhile results. AI-powered cyber security solutions drive proactive threat prevention, accelerated response times, reduced false positives, […]