article thumbnail

AI in Cybersecurity: How to Cut Through the Overhype and Maximize the Potential

CyberSecurity Insiders

–( BUSINESS WIRE )–Artificial intelligence (AI), machine learning (ML), and deep learning (DL) are often applied in cybersecurity, but their applications may not always work as intended. SCHAUMBURG, Ill.–( On the other hand, there are a few areas where ML is overused.

article thumbnail

Why Human Input Is Still Vital to Cybersecurity Tech

SecureWorld News

Utilizing advances in artificial intelligence (AI) and machine learning (ML), cybersecurity technology is now able to provide services such as 24/7 monitoring and constant analysis in a way that is simply impractical for human cybersecurity staff. There are tasks such as penetration testing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

From a tech explosion to accidental cyberattacks, researchers offer a glimpse into 2030

SC Magazine

Enter Project 2030, a collaboration between Oxford Visiting Researcher Victoria Baines and Trend Micro Vice President of Security Research Rik Ferguson, which uses a mixture of survey data and forward-thinking understanding of technology to predict the infosec concerns a decade from now. AI could impact more than just social engineering.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

How to screen for natural infosec talent: Ask for a worst case scenario for any common situation. Through tenures at Citrix, HP, and Bugcrowd, Jason Haddix offers his expertise in the areas of penetration testing , web application testing, static analysis, and more. — Jack Daniel (@jack_daniel) October 10, 2018.

article thumbnail

Story of the year: the impact of AI on cybersecurity

SecureList

However, as the influence of artificial intelligence extends far beyond linguistic accolades, a nuanced narrative emerges, encapsulating both the marvels and challenges of our AI-infused reality. WormGPT ), and beyond. Since the debut of GPT-3.5

article thumbnail

CISSPs from Around The Globe: An Interview with Theresa Grafenstine

CyberSecurity Insiders

Yet, although I didn't need another one, I looked at it just as we were getting ready to do a big penetration test of the US House of Representatives’ network. The people at Citi heard me speak on artificial intelligence and robotic process automation, and different cyber concerns that audit should be looking at.

article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. DXC Technology has over 40 years of infosec experience, most of which as HPE’s Enterprise Services. Penetration Testing.