AI and ML in Security - Security Boulevard https://securityboulevard.com/category/editorial-calendar/ai-and-ml-in-security/ The Home of the Security Bloggers Network Wed, 28 Aug 2024 12:17:53 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.1 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png AI and ML in Security - Security Boulevard https://securityboulevard.com/category/editorial-calendar/ai-and-ml-in-security/ 32 32 133346385 Fortinet Debuts Sovereign SASE, Updates Unified SASE With FortiAI https://securityboulevard.com/2024/08/fortinet-debuts-sovereign-sase-updates-unified-sase-with-fortiai/ Wed, 28 Aug 2024 12:17:53 +0000 https://securityboulevard.com/?p=2029038 Fortinet, SASE, Opal, access privileges, cloud security, GenAI, generative AI cloud compromise LLM

Security specialist Fortinet announced the debut of Sovereign SASE and the integration of Generative AI (GenAI) technology into its Unified SASE offering.

The post Fortinet Debuts Sovereign SASE, Updates Unified SASE With FortiAI appeared first on Security Boulevard.

]]>
2029038
Facebook Whistleblower Fears Election Abuse https://securityboulevard.com/2024/08/facebook-whistleblower-fears-election-abuse/ Tue, 27 Aug 2024 22:23:54 +0000 https://securityboulevard.com/?p=2028890 Frances Haugen, who famously blew the whistle on Facebook and its susceptibility to manipulation, has renewed concerns over the social-networking company. This time, she’s laser-focused on misinformation during the 2024 presidential election. “We are in a new, very nebulous era where we need to think more holistically and creatively” in defending cyberdefenses, Haugen said in..

The post Facebook Whistleblower Fears Election Abuse appeared first on Security Boulevard.

]]>
2028890
‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril https://securityboulevard.com/2024/08/telegram-terrorgram-grid-richixbw/ Tue, 27 Aug 2024 17:19:11 +0000 https://securityboulevard.com/?p=2028965 Sign reads, “Danger: High Voltage!”

Should’ve listened to Edison: After the arrest of Pavel Durov—the Telegram CEO—comes news of domestic extremists using the chat app to organize.

The post ‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril appeared first on Security Boulevard.

]]>
2028965
The Essential Guide to Evaluating Competitive Identity Verification Solutions https://securityboulevard.com/2024/08/the-essential-guide-to-evaluating-competitive-identity-verification-solutions/ Mon, 19 Aug 2024 10:40:13 +0000 https://securityboulevard.com/?p=2028084 identity, verification, FireTail digital identity decentralized Entitle API identity credential theft

Amid customer and regulatory pressure and intensifying cyberattacks, organizations must ensure their identity verification strategies match up against AI-powered fraud techniques.

The post The Essential Guide to Evaluating Competitive Identity Verification Solutions appeared first on Security Boulevard.

]]>
2028084
How to Maximize Network Security With AI and ML https://securityboulevard.com/2024/08/how-to-maximize-network-security-with-ai-and-ml/ Thu, 15 Aug 2024 13:50:57 +0000 https://securityboulevard.com/?p=2027820 network security, AI and ML, SASE

There is an increased focus on how advances in artificial intelligence (AI) and machine learning (ML) can negatively impact network security.

The post How to Maximize Network Security With AI and ML appeared first on Security Boulevard.

]]>
2027820
How LLMs are Revolutionizing Data Loss Prevention https://securityboulevard.com/2024/08/how-llms-are-revolutionizing-data-loss-prevention/ Wed, 14 Aug 2024 09:34:30 +0000 https://securityboulevard.com/?p=2027582 LLMs, security, risk, Google AI LLM vulnerability

As data protection laws take hold across the world and the consequences of data loss become more severe, let’s take a closer look at the transformative potential that LLMs bring to the table.

The post How LLMs are Revolutionizing Data Loss Prevention appeared first on Security Boulevard.

]]>
2027582
Will GitOps Solve Configuration Security Issues?  https://securityboulevard.com/2024/08/will-gitops-solve-configuration-security-issues/ Wed, 14 Aug 2024 08:58:39 +0000 https://securityboulevard.com/?p=2027576 configuration security, AI, man using macbook.

Rather than rely only on GitOps, teams should first implement AI and analytics capabilities to reduce human configuration security errors. 

The post Will GitOps Solve Configuration Security Issues?  appeared first on Security Boulevard.

]]>
2027576
RAD Security Combines AI With Behavioral Analytics to Improve Cybersecurity https://securityboulevard.com/2024/08/rad-security-combines-ai-with-behavioral-analytics-to-improve-cybersecurity/ Thu, 08 Aug 2024 06:29:18 +0000 https://securityboulevard.com/?p=2027007 survey, budgets, cybersecurity, AI tools, RAD, threats, security, SIEM cybersecurity Red Menshen budgets semiconductor data, secure, conflict, oil security tools budget dark, web, threat

RAD Security this week at the Black Hat USA 2024 conference revealed it has added artificial intelligence (AI) capabilities to its cloud detection and response (CDR) platform as part of an ongoing effort to reduce dependencies on signatures that need to be developed before threats can be detected.

The post RAD Security Combines AI With Behavioral Analytics to Improve Cybersecurity appeared first on Security Boulevard.

]]>
2027007
Tenable Adds Ability to Prioritize Vulnerabilities by Threat Level https://securityboulevard.com/2024/08/tenable-adds-ability-to-prioritize-vulnerabilities-by-threat-level/ Wed, 07 Aug 2024 16:16:08 +0000 https://securityboulevard.com/?p=2026979 Tenable, application security, vulnerabilities, software, vulnerabilities, issues, servers, vulnerability, Linux, vulnerability management, risk-based, vulnerabilities third-party supply chain Okta endpoint security

Tenable this week at the Black Hat USA 2024 conference added an ability to identify the vulnerabilities in an IT environment that should be remediated first based on the actual threat they represent.

The post Tenable Adds Ability to Prioritize Vulnerabilities by Threat Level appeared first on Security Boulevard.

]]>
2026979
DSPM: A Cybersecurity Approach Tailor-Made for This AI Era https://securityboulevard.com/2024/08/dspm-a-cybersecurity-approach-tailor-made-for-this-ai-era/ Mon, 05 Aug 2024 08:24:15 +0000 https://securityboulevard.com/?p=2026613 AI, AI models, generative AI, cybersecurity, ProtectAI generative AI ASPM CSPM SIEM cybersecurity application Palo Alto Networks OT CISO

As AI adoption grows, so does organizations’ appetite for the vast data from disparate sources needed to train AI models. Because of this, companies are grappling with how to safeguard a surging amount of fragmented data wherever it lives.

The post DSPM: A Cybersecurity Approach Tailor-Made for This AI Era appeared first on Security Boulevard.

]]>
2026613