artificial intelligence
![devsecops](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/10085319/devsecops1-400x200.jpg)
Strategies for harmonizing DevSecOps and AI
The same digital automation tools that have revolutionized workflows for developers are creating an uphill battle regarding security. From data breaches and cyberattacks to …
![analyst](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103822/analyst-400x200.jpg)
CISOs and board members work more closely than ever before
73% of board members believe they face the risk of a major cyber attack in the next 12 months, a notable increase from 65% in 2022, according to Proofpoint. Likewise, 53% feel …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/22145259/laptop-ai-400x200.png)
3 ways to strike the right balance with generative AI
To find the sweet spot where innovation doesn’t mean sacrificing your security posture, organizations should consider the following three best practices when leveraging AI. …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/09170820/ai-brain-400x200.jpg)
Emerging threat: AI-powered social engineering
Social engineering is a sophisticated form of manipulation but, thanks to AI advancements, malicious groups have gained access to highly sophisticated tools, suggesting that …
![Kevin Valk](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/29110533/kevin_valk-2-codean-400x200.jpg)
What does optimal software security analysis look like?
In this Help Net Security interview, Kevin Valk, co-CEO at Codean, discusses the consequences of relying solely on automated tools for software security. He explains how these …
![CISO](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/10123028/ciso-400x200.jpg)
The secret habits of top-performing CISOs
69% of top-performing CISOs dedicate recurring time on their calendars for personal professional development, according to Gartner. This is compared with just 36% of …
![Google DeepMind](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/30103034/google_deepmind-400x200.jpg)
Google launches tool to identify AI-generated images
Google is launching a beta version of SynthID, a tool that identifies and watermarks AI-generated images. The tool will initially be available to a limited number of customers …
![SaaS](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/27135719/saas-400x200.jpg)
IT leaders alarmed by generative AI’s SaaS security implications
IT leaders are grappling with anxiety over the risks of generative AI despite continued confidence in their software-as-a-service (SaaS) security posture, according to Snow …
![robot](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093146/robot-400x200.jpg)
Uncovering a privacy-preserving approach to machine learning
In the era of data-driven decision making, businesses are harnessing the power of machine learning (ML) to unlock valuable insights, gain operational efficiencies, and …
![large language models](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11160742/llms-3-400x200.jpg)
Customizing LLMs for domain-specific tasks
The expansion of large language models (LLMs) in recent times has brought about a revolutionary change in machine learning processes and has introduced fresh perspectives on …
![Gerwin van der Lugt](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/17102549/gerwin_van_der_lugt-2-oddity_ai-400x200.jpg)
AI and the evolution of surveillance systems
In this Help Net Security interview, Gerwin van der Lugt, CTO at Oddity, discusses the future of surveillance and AI’s influence. He also delves into how organizations …
![Roland Atoui](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131101/roland_atoui-2-red_alert_labs-400x200.jpg)
Anticipating the next wave of IoT cybersecurity challenges
In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from isolated IoT setups to interconnected …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege