generative AI

Google Uses Its Big Sleep AI Agent to Find SQLite Security Flaw
Google researchers behind the vendor's Big Sleep project used the LLM-based AI agent to detect a security flaw in SQLite, illustrating the value the emerging technology can have in discovering vulnerabilities that ...
Security Boulevard

Transforming enterprises with generative AI: Pallavi Nargund’s keynote at ADDO
Generative artificial intelligence (AI) is transforming industries, enabling businesses to harness the power of machine learning (ML) to reshape customer experiences and revolutionize software development ...

Revolutionizing software development: Frank Roe’s keynote at ADDO
The world of software development is rapidly evolving, driven by increasing pressure to deliver faster, yet with fewer resources, and the widespread adoption of generative AI tools ...

Navigating new regulations and the role of SBOMs in software security
Recently in our webinar series with Amazon Web Services (AWS) and Fortify by OpenText™, our third installment, "The Power of SBOMs: Regulations Looming," brought the panel together to discuss the evolving role ...

Why NTIA Support of Open-Source AI is Good for Security
A fully open model — one where the training data is available for inspection and modification — provides a means for addressing another threat: malicious or accidentally bad training data ...
Security Boulevard

Broadcom Extends VMware Cybersecurity Portfolio
Broadcom today at the VMware Explore 2024 conference extended its VMware vDefend portfolio to include generative artificial intelligence (AI) capabilities in addition to extending its software-defined edge computing portfolio to provide deeper ...
Security Boulevard

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Barry Strauss | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Stephen Kowski | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...

Thawing Your Email Security Strategy with Frost’s 2024 Radar Report: A Dynamic Cyber Threat Landscape
Stephen Kowski | | ao;, Cloud Email Security, CTO Corner, Cybersecurity, Endpoint security, frost radar, Gen AI, generative AI, graymail, Industry Report, Phishing, Spam, threat detection
In today’s digital age, email remains the primary conduit for business communication, making it a prime target for cybercriminals. The Frost Radar Research Report on Email Security for 2024 underscores the critical ...

Thawing Your Email Security Strategy with Frost’s 2024 Radar Report: A Dynamic Cyber Threat Landscape
Stephen Kowski | | ao;, Cloud Email Security, CTO Corner, Cybersecurity, Endpoint security, frost radar, Gen AI, generative AI, graymail, Industry Report, Phishing, Spam, threat detection
In today’s digital age, email remains the primary conduit for business communication, making it a prime target for cybercriminals. The Frost Radar Research Report on Email Security for 2024 underscores the critical ...