Major government agencies in the United States intend to apply artificial intelligence, but the majority of planned use cases are still at the planning stage, a congressional watchdog said. Missing from those efforts is governmentwide guidance on the acquisition and use of AI technologies.
In this special edition at Black Hat Europe 2023 in London, three ISMG editors cover the highlights of the conference, including a resounding call for better collaboration between government agencies and the private sector, regulatory trends, and the cautionary tale of ex-Uber CISO Joe Sullivan.
A National Institute of Standards and Technology official said agencies are facing a variety of challenges in implementing enterprisewide zero trust architectures, from a lack of insight into their network components to difficult decisions around legacy systems and costly procurement initiatives.
A vendor focused on fast-tracking government access to commercial software closed its Series B funding round to support more classified and regulated environments. The $40 million will allow Second Front Systems to support additional bespoke networks in the U.S. Defense and National Security space.
In the latest weekly update, the former federal CISO, Grant Schneider, joins three editors at ISMG to discuss important cybersecurity issues, including advice for the next White House cyber director and liability concerns facing CISOs following SolarWinds and its CISO being accused of fraud.
European electoral and cybersecurity authorities on Tuesday held a joint exercise assessing plans to hold an incident-free election, weeks after trading bloc cybersecurity agency ENISA said the election is at risk from deepfake images and videos.
The Federal Trade Commission voted unanimously to approve the use of civil investigative demands for investigations related to the use of artificial intelligence, after a White House executive order on AI tasked the commission with policing competition and protecting consumers.
Drenan Dudley, who previously served as deputy national cyber director for strategy and budget at the Office of the National Cyber Director, will temporarily lead the agency while the White House nominee to serve in a permanent capacity awaits a vote in the Senate.
Global Tel*Link, a major telecommunications provider for state and federal prison systems, will be required to notify the FTC and consumers of future security incidents after a sweeping data breach left hundreds of thousands of its users vulnerable to identity theft and other privacy concerns.
In the latest "Proof of Concept," Zscaler's Sam Curry and Venable's Heather West join ISMG editors to discuss the implications of President Biden's executive order on AI, how AI enhances security review processes, the potential for AI to spot software flaws, and challenges of AI talent acquisition.
Regulating AI is "like regulating Jell-O," said Massachusetts risk counsel Jenny Hedderman, but states are looking at regulating "areas of harm" rather than AI as a whole. In this episode of "Cybersecurity Insights," Hedderman discusses privacy, third-party vendor risk, and lawyers' use of AI.
U.S. federal prosecutors unsealed an indictment against three foreign nationals for allegedly participating in a $48 million fraud scheme. The alleged reshipping scheme operated between 2013 and 2018 while the three defendants lived in Russia.
The U.S. Cybersecurity and Infrastructure Security Agency said it was setting up a variety of real-time initiatives to provide technical support and cybersecurity assistance for election offices nationwide, including an Election Day operations center and a virtual cyber situational awareness room.
The Federal Trade Commission in an amended lawsuit complaint unsealed Friday details how Idaho-based data broker Kochava allegedly violated federal law by collecting and disclosing to third parties "enormous" amounts of geolocation and other sensitive information about consumers.
The Department of Defense has published guidance calling for the rapid and responsible deployment of artificial intelligence systems across its entire enterprise while emphasizing continuous experimentation, iterative feedback loops between experts and users and enhanced data and analytics programs.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.