article thumbnail

Deepfake technology and its implications for the future of cyber-attacks

CyberSecurity Insiders

Once the recording (for this is what it turned out to be) began with the next line in the pre-programmed speech, with no acknowledgement of my response, I knew I was dealing with a robot powered by technology that simulated a real voice. With every passing day attackers grow more and more intelligent, creative, and technologically advanced.

article thumbnail

On Trust and Transparency in Detection

Anton on Security

But as we increasingly move towards more elaborate detection approaches like detection-as-code using languages like the Sigma language , or Python, it is becoming more difficult to deduce in detail how certain threat detections work. the cornerstone of all effective cyber threat detection systems is accurate detection.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Unmasking the Cracks of Today’s Cyber Defence

Jane Frankland

C-suites across all industries, from traditional finance to the latest “unicorns” emerging in the fintech industry, are facing a formidable challenge: how to protect their business and customer data against growing cyber threats. I’ve partnered with e2e-assure, a leading managed threat detection and response firm as I believe in their brand.

CISO 147
article thumbnail

The Best Way to Detect Threats In the Cloud?

Anton on Security

Let’s continue our fun conversation on threat detection in the cloud that we started in “Who Does What In Cloud Threat Detection?” and “How to Think about Threat Detection in the Cloud” and continued somewhat in “Detection as Code? No, Detection as COOKING!” or even goodness in detection.

article thumbnail

What Lies Ahead for Cybersecurity in the Era of Generative AI?

IT Security Guru

It requires human input each time you access accounts. Technological solutions, like Risk-Adaptive Protection and Data Loss Prevention, are also essential. Proactive threat detection is one of GenAI’s primary benefits. You’re able to leverage this technology to benefit your company if you know the latest threat.

article thumbnail

2024 Tech and Cybersecurity Forecast: Navigating New Frontiers in Business

Thales Cloud Protection & Licensing

In an era where technology evolves at a blistering pace, business leaders must stay ahead of the curve. Quantum Computing and Its Business Impact Quantum computing stands at the forefront of technological evolution, poised to redefine the boundaries of processing power and problem-solving. The same is true for today’s business leaders.

article thumbnail

The Best Way to Detect Threats In the Cloud?

Security Boulevard

Let’s continue our fun conversation on threat detection in the cloud that we started in “Who Does What In Cloud Threat Detection?” and “How to Think about Threat Detection in the Cloud” and continued somewhat in “Detection as Code? No, Detection as COOKING!” or even goodness in detection.