![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/22145259/laptop-ai-400x200.png)
Unlocking GenAI’s full potential through work reinvention
To achieve the full potential of AI, organizations must reinvent work, reshape the workforce and prepare workers, according to Accenture. A new report from Accenture reveals …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/24165916/brain-3d-400x200.png)
Adversaries exploit trends, target popular GenAI apps
More than 10% of enterprise employees access at least one generative AI application every month, compared to just 2% a year ago, according to Netskope. In 2023, ChatGPT was …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203448/data_analytics2-400x200.jpg)
IT teams unable to deliver data fast enough to match the speed of business
Increasing data requests overwhelm IT teams, but security concerns hinder their ability to provide employees with access to timely data, according to CData Software. The …
![internet](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/14190226/internet-global1-400x200.jpg)
Geopolitical tensions combined with technology will drive new security risks
Misinformation and disinformation are biggest short-term risks, while extreme weather and critical change to Earth systems are greatest long-term concern, according to the …
![large language models](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11160756/llms-1-400x200.jpg)
LLM hype fades as enterprises embrace targeted AI models
2023 was the year of AI enterprise adoption, with 55% of organizations adopting AI into their workflows, according to a recent report from McKinsey & Co. This adoption …
![API](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26141959/api2-400x200.jpg)
APIs are increasingly becoming attractive targets
APIs, a technology that underpins today’s most used sites and apps, are being leveraged by businesses more than ever—ultimately opening the door to more online threats than …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/06062102/secure-ai-1400-400x200.jpg)
Securing AI systems against evasion, poisoning, and abuse
Adversaries can intentionally mislead or “poison” AI systems, causing them to malfunction, and developers have yet to find an infallible defense against this. In …
![attacks](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/08140013/attacks-400x200.jpg)
Escalating cyber threats: Bots, fraud farms, and cryptojacking surge, urgently requiring attention
The motivations behind cyberattacks are as diverse as the methods employed. Whether driven by financial gain, political agendas, or sheer malice, cybercriminals exploit …
![mental health](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/24165903/mental_health-400x200.png)
Budget cuts take a toll on IT decision makers’ mental health
60% of IT decision-makers agreed that budget cuts have negatively impacted their mental health and wellbeing, according to Integrity360. To add to that, 55% noted that the …
![open-source cybersecurity tools](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/11131608/open-source-cybersecurity-tools-1400-400x200.jpg)
15 open-source cybersecurity tools you’ll wish you’d known earlier
Open-source tools represent a dynamic force in the technological landscape, embodying innovation, collaboration, and accessibility. These tools, developed with transparency …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/11092828/lock-computer-blue-400x200.jpg)
Consumers prepared to ditch brands after cybersecurity issues
In 2023, businesses have been hit with 800,000 cyberattacks, over 60,000 of which were DDoS attacks and 4,000 falling victim to ransomware, according to Vercara. The research …
![cybersecurity budget](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/27163444/cybersecurity_budget-1400-400x200.jpg)
Facts and misconceptions about cybersecurity budgets
Managing and allocating budgets for cybersecurity and IT has become an increasingly critical aspect of organizational strategy. Organizations recognize the need to invest …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege