The arms race continues between those attempting to detect GenAI-created content and those who want to keep their origins concealed. For example, detecting if ChatGPT was employed to write content, such as academic papers. According to reports, OpenA
AI (19)
Fireside Chat On "The Future Of AI In Cybersecurity"
With Bruce Schneier (Cyptographer, author & security guru) and Bikash Barai (Co-founder, CISOPlatform & FireCompass)
>> Click Here To Read The Executive Summary.
Featured Blogs To R
Google wants to up-sell enterprise Gmail users for AI security enhancements, when in reality the feature is mitigating the advances that attackers are making through their own innovative use of AI, making their Social Engineering attacks more effecti
Last month, we were thrilled to have Bruce Schneier join us at the CISO Platform Summit 2024 in a fireside chat with Bikash Barai.
Bruce is one of the foremost cryptographers and a leading mind in cybersecurity. Often referred to as the "security guru
Reuven Cohen, who goes by the Twitter handle @ruv, has recently been experimenting with using GPT to power attack bots. He recently posted this on his Facebook page after being able to create such an attack bot very quickly:
“Autonomous AI Hack Bots
I had a great discussion with Julian, from eChannelNEWS where we discussed the pivotal role of information dissemination and the construction of a fortified cybersecurity ecosystem. Of particular importance is the influence that AI will have on cyber
The White House just released an Executive Order intended to lay down some standards intended to manage the risks of Artificial Intelligence. I absolutely like the idea of establishing guardrails to make AI safe, secure, and trustworthy, but I am uns
AI tech is a powerful tool. The original photo (left) was cleaned-up with an AI deep learning algorithm (Image source: from Murilo Gustineli) and restoring tremendous clarity.
The AI researchers outline their progress in their white paper Towards Real
Formal Modeling and Automation is one of the things I love. I try to model everything and sometimes modeling helps and sometime it lands me in trouble. It helped me when I tried to model Penetration Testing and worked with my co-founder to design our
Artificial intelligence – more specifically, the machine learning (ML) subset of AI - has a number of privacy problems.
Not only does ML require vast amounts of data for the training process, but the derived system is also provided with access to even
Topic of discussion : The Talent Shortage in Cybersecurity
Listen To Podcast: https://player.captivate.fm/episode/6c842a64-cff1-4119-beb3-1989940c47cf
Thank you Katelyn Ilkani, I thoroughly enjoyed discussing the challenges of the talent shortage in cy
Digitally altered and synthetic media are becoming more of a problem. Openly available tools, including AI Deep Learning, enable the easy modification of pictures and videos for distribution on the Internet. Most are benign; clearing up acne, impro
My recent interview with Mark Byrne, from Cybx Security, covered a great range of cybersecurity questions, including new threats and solutions, Artificial Intelligence, DevSecOps, cybercrime, security impacts of Coronavirus, and the future of cybers
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks on Offensive Security: Breach Stories to Defense Using Offense
- Description:
Speaker: Saravanakumar Ramaiah, Director - Technology Risk Management at Sutherland
Moderator: Rajiv Nandwani, Global Information Security Director at BCG.
Topic: Offensive Security: Breach Stories to Defense Using Offense… - Created by: Biswajit Banerjee