"Has anyone witnessed any examples of criminals abusing artificial intelligence?" That's a question security firms have been raising. A new report has identified likely ways in which such attacks might occur and offers examples of threats already emerging
As online activity increases and digital footprints expand, so too does the overall application attack surface. The recent shifts in consumer behaviours have greatly accelerated business digital transformation and compounded the associated application fraud and abuse.
In response, security, fraud and marketing...
Behavioral biometrics have evolved, and Michael Yeardley of LexisNexis Risk Solutions says the new generation of controls can not only identify the bad guy - but also "the really clever bad guy." He explains how.
To protect today's dynamic workforce, security teams must be equipped to discern when and how a trusted account has been leveraged for nefarious purposes. This requires more than just an understanding of 'good' vs 'bad' - it requires an 'immune system' approach to security that is not only adaptive, but also grounded...
Cyberattacks have rapidly evolved since the advent of online transacting almost 25 years ago, with attackers continually escalating and refining their techniques to protect their illicit revenue streams. More recently, cybercriminals have been weaponizing AI tools to easily bypass traditional security controls and...
Though parts of the world are slowly transitioning back to 'normal', cyber-attackers have not slowed down and may even be waiting to take advantage of new business challenges.
Join, Justin Fier - Director of Cyber Intelligence & Analytics, as he discusses how traditional cyber security tools are ill-equipped to...
This report details seven case studies of attacks that were
intercepted and neutralized by cyber defense AI, including
insider threat, ransomware, and IoT attacks.
While all threat scenarios were distinct, some fast-moving
and others slow and stealthy, in all cases the subtle indicators
of suspicious activity...
The myriad of security tools used by businesses today creates
massive quantities of data and surfaces too many alerts for
analysts to effectively manage. As threats become increasingly
sophisticated and the cyber security industry continues
to face a skills shortage, over-worked and under-resourced
As in many other areas plagued by digital complexity, business leaders and security
teams have ultimately turned to artificial intelligence to keep pace.
Download this whitepaper to discover how Darktrace technology offers a solution to the threat landscape of today, and learn about:
Email and collaboration platforms are the connective tissue
of most businesses and organizations, where information
is shared, plans are hatched, and alliances formed. Yet as a
human-driven medium, email often represents the 'weakest
link' in an organization's security strategy. Indeed, 94% of
eKYC not only enables financial institutions to onboard their customers remotely without the need for face-to-face interactions, it has also provided consumers a more flexible option to perform and manage their own transactions anytime, anywhere.
Before deciding whether to build your own on-premise eKYC system or...
Cybercriminals have weaponized AI tools to easily bypass traditional security controls and create effective new attacks such as credential stuffing. That means it's time to shift to next gen cybersecurity, says Shuman Ghosemajumder of F5. And here are the technologies that will get you there.
Predictive IT is a powerful new approach that uses machine learning and artificial intelligence (AI) to predict incidents before they impact customers and end users. By using AI and predictive analytics, IT organizations are able to deliver seamless customer experiences that meet changing customer behavior and...
Disruption, distortion and deterioration - these cybersecurity threats are amplified by the ongoing pandemic. Which poses the greatest threat and why? We asked this exclusive panel of CEOs and CISOs, and their responses might surprise you.