Security Intelligence

Security Intelligence Analysis and Insight for Information Security Professionals

  • 4 ways to bring cybersecurity into your community
    by Jennifer Gregory on February 14, 2025 at 2:00 pm

    It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an The post 4 ways to bring cybersecurity into your community appeared first on Security Intelligence.

  • How red teaming helps safeguard the infrastructure behind AI models
    by Charles Owen-Jackson on February 13, 2025 at 2:00 pm

    Artificial intelligence (AI) is now squarely on the frontlines of information security. However, as is often the case when the pace of technological innovation is very rapid, security often ends up being a secondary consideration. This is increasingly evident from the ad-hoc nature of many implementations, where organizations lack a clear strategy for responsible AI The post How red teaming helps safeguard the infrastructure behind AI models appeared first on Security Intelligence.

  • When you shouldn’t patch: Managing your risk factors
    by Sue Poremba on February 12, 2025 at 2:00 pm

    Look at any article with advice about best practices for cybersecurity, and about third or fourth on that list, you’ll find something about applying patches and updates quickly and regularly. Patching for known vulnerabilities is about as standard as it gets for good cybersecurity hygiene, right up there with using multi-factor authentication and thinking before The post When you shouldn’t patch: Managing your risk factors appeared first on Security Intelligence.

  • The straight and narrow — How to keep ML and AI training on track
    by Doug Bonderud on February 11, 2025 at 2:00 pm

    Artificial intelligence (AI) and machine learning (ML) have entered the enterprise environment. According to the IBM AI in Action 2024 Report, two broad groups are onboarding AI: Leaders and learners. Leaders are seeing quantifiable results, with two-thirds reporting 25% (or greater) boosts to revenue growth. Learners, meanwhile, say they’re following an AI roadmap (72%), but The post The straight and narrow — How to keep ML and AI training on track appeared first on Security Intelligence.

  • Reducing ransomware recovery costs in education
    by Jennifer Gregory on February 10, 2025 at 2:00 pm

    2024 continued the trend of ransomware attacks in the education sector making headlines. The year opened with Freehold Township School District in New Jersey canceling classes due to a ransomware attack. Students at New Mexico Highlands University missed classes for several days while employees experienced disruption of their paychecks after a ransomware attack. The attack on The post Reducing ransomware recovery costs in education appeared first on Security Intelligence.

  • Will AI threaten the role of human creativity in cyber threat detection?
    by Sue Poremba on February 7, 2025 at 2:00 pm

    Cybersecurity requires creativity and thinking outside the box. It’s why more organizations are looking at people with soft skills and coming from outside the tech industry to address the cyber skills gap. As the threat landscape becomes more complex and nation-state actors launch innovative cyberattacks against critical infrastructure, there is a need for cybersecurity professionals The post Will AI threaten the role of human creativity in cyber threat detection? appeared first on Security Intelligence.

  • Hacking the mind: Why psychology matters to cybersecurity
    by Jonathan Reed on February 6, 2025 at 2:00 pm

    In cybersecurity, too often, the emphasis is placed on advanced technology meant to shield digital infrastructure from external threats. Yet, an equally crucial — and underestimated — factor lies at the heart of all digital interactions: the human mind. Behind every breach is a calculated manipulation, and behind every defense, a strategic response. The psychology The post Hacking the mind: Why psychology matters to cybersecurity appeared first on Security Intelligence.

  • Stress-testing multimodal AI applications is a new frontier for red teams
    by Charles Owen-Jackson on February 5, 2025 at 5:00 pm

    Human communication is multimodal. We receive information in many different ways, allowing our brains to see the world from various angles and turn these different “modes” of information into a consolidated picture of reality. We’ve now reached the point where artificial intelligence (AI) can do the same, at least to a degree. Much like our The post Stress-testing multimodal AI applications is a new frontier for red teams appeared first on Security Intelligence.

  • Cybersecurity awareness: Apple’s cloud-based AI security system
    by Sue Poremba on February 5, 2025 at 2:00 pm

    The rising influence of artificial intelligence (AI) has many organizations scrambling to address the new cybersecurity and data privacy concerns created by the technology, especially as AI is used in cloud systems. Apple addresses AI’s security and privacy issues head-on with its Private Cloud Compute (PCC) system. Apple seems to have solved the problem of The post Cybersecurity awareness: Apple’s cloud-based AI security system appeared first on Security Intelligence.

  • How AI-driven SOC co-pilots will change security center operations
    by Jennifer Gregory on February 4, 2025 at 2:00 pm

    Have you ever wished you had an assistant at your security operations centers (SOCs) — especially one who never calls in sick, has a bad day or takes a long lunch? Your wish may come true soon. Not surprisingly, AI-driven SOC “co-pilots” are topping the lists for cybersecurity predictions in 2025, which often describe these The post How AI-driven SOC co-pilots will change security center operations appeared first on Security Intelligence.

Share Websitecyber