AI
![data security. organization, survey, data, data governance, data privacy, data security, AI, FTC data broker geolocation](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Survey Finds Confidence in Data Security Despite Ransomware Scourge
A survey of 322 IT and security professionals finds nearly two-thirds (63%) have confidence in the effectiveness of their organization’s data security measures with another 30% uncertain despite the volume of breaches ...
Security Boulevard
![AI, AI-powered attacks, AI, defense, cybersecurity,](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Human Vigilance is Required Amid AI-Generated Cybersecurity Threats
While many organizations are adopting AI at an alarming pace to gain efficiencies and lower operating costs through technology and headcount reduction, they may also be sacrificing their security ...
Security Boulevard
![AI, AI-powered attacks, AI, defense, cybersecurity,](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Rethinking Cybersecurity in the Age of AI
IT managers and CSOs need to rethink their approach to cybersecurity and protect their organizations from this new breed of AI-powered attacks ...
Security Boulevard
![Evolution of Phishing Attacks](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization
Barry Strauss | | AI, bec, Browser Phishing Protection, Browser protection, business email compromise, cyberthreats, Email Protection, executive impersonation, generative AI, generative ai gen ai, Mobile, Mobile Phishing Protection, Product, smishing
The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it ...
Why Is Reliable Software Surprising?
Joao Correia | | AI, IT, Kernel Care Enterprise, Linux Tips & Patch Management, maintenance work, Reliable Software
Software comes in all shapes and sizes: monolith applications, small utilities, run-of-the-mill middleware, web platforms, mobile apps, etc.. But it seems like finding one that actually “just works” as advertised is increasingly ...
![cybersecurity, security, organizations, budget, budgets, Small Security Budget](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Security Budgets Grow, but Inefficiencies Persist
Most organizations are uncertain about the effectiveness of their cybersecurity investments, despite increasing budgets and rampant cyber incidents, according to Optiv’s 2024 Threat and Risk Management Report ...
Security Boulevard
Exploring Cutting-Edge Browser Security with Vivek Ramachandran – Founder of SquareX
Tom Eston | | AI, Application Security, AppSec, browser, Cafe Latte Attack, Cyber Security, Cybersecurity, Data Privacy, defcon, Digital Privacy, Episodes, Information Security, Infosec, Podcast, Podcasts, Privacy, Secure Web Gateway, security, Special Editions, SquareX, SWG, technology, Vivek Ramachandran, web browser, Web security, Weekly Edition, WEP, wifi, WiFi security
In this special episode of the Shared Security Podcast, host Tom Eston interviews Vivek Ramachandran, the founder of SquareX. Vivek shares his journey in WiFi security, recounting his introduction of the Cafe ...
![Google AI LLM vulnerability](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Google’s Project Naptime Aims for AI-Based Vulnerability Research
Security analysts at Google are developing a framework that they hope will enable large language models (LLMs) to eventually be able to run automated vulnerability research, particularly analyses of malware variants. The ...
Security Boulevard
![Gartner 2024 NA Security & Risk Management Summit](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
AI Everywhere: Key Takeaways from the Gartner Security & Risk Management Summit 2024
Barry Strauss | | AI, CTO Corner, Gartner, generative AI, generative ai gen ai, Security and Risk Management
The Gartner Security & Risk Management Summit 2024 showcased the transformative power of artificial intelligence (AI) across various industries, with a particular focus on the cybersecurity landscape. As organizations increasingly adopt AI ...
![Why Data-Centric Security Is a Critical Foundation for AI-Powered Analytics](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Why Data-Centric Security Is a Critical Foundation for AI-Powered Analytics
Data analytics have been used for decades to enhance business insight and drive efficiency, growth and innovation. But the addition of intelligent algorithms and cloud computing power offers potentially game-changing opportunities to ...