<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Are AI-Engineered Threats FUD or Reality? in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Are-AI-Engineered-Threats-FUD-or-Reality/m-p/61372#M6307</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1094077607"&gt;@yahhana6&lt;/a&gt;&amp;nbsp;&amp;nbsp; I agree there is a fair bit of FUD, but at the end of the day, it comes to three factors:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1). Explainability and trust&lt;/P&gt;&lt;P&gt;2). AI Ethics and Governance&lt;/P&gt;&lt;P&gt;3). &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Purpose, transparency, and skills.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;If you cannot find answers to those, perhaps you should not be using that particular foundation model or provider.&amp;nbsp;&amp;nbsp; Also do you know what happens with your corporate data or your personal data - is it sold off or passed to the provider as a means of providing further rev&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;The main tenants within security is automation, AI continuously learns, improving its knowledge to understand cybersecurity threats and cyber risk by consuming billions of data artifacts.&amp;nbsp; AI reasoning finds threats easier - analysing relationships between threats like malicious files, suspicious IP addresses or insiders in seconds or minutes.&amp;nbsp; AI eliminates time-consuming tasks - curated risk analysis, reducing the time security analysts take to make critical decisions and remediate threats.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;AI will be used by the dark forces as well, conversely to create better means of compromising human beings or finding different weaknesses far quicker than humans can do so.&amp;nbsp; FraudGPT, and WormGPT are examples of services being offered by subscription on the dark web today.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Regards&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Caute_Cautim&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Wed, 02 Aug 2023 20:57:18 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2023-08-02T20:57:18Z</dc:date>
    <item>
      <title>Are AI-Engineered Threats FUD or Reality?</title>
      <link>https://community.isc2.org/t5/Industry-News/Are-AI-Engineered-Threats-FUD-or-Reality/m-p/61233#M6296</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The rise of generative AI is creating new ways to both attack and defend assets. Which threats are solid and which are vapor?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.darkreading.com/dr-tech/are-ai-engineered-threats-fud-or-reality-" target="_blank"&gt;https://www.darkreading.com/dr-tech/are-ai-engineered-threats-fud-or-reality-&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:40:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Are-AI-Engineered-Threats-FUD-or-Reality/m-p/61233#M6296</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T10:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: Are AI-Engineered Threats FUD or Reality?</title>
      <link>https://community.isc2.org/t5/Industry-News/Are-AI-Engineered-Threats-FUD-or-Reality/m-p/61372#M6307</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1094077607"&gt;@yahhana6&lt;/a&gt;&amp;nbsp;&amp;nbsp; I agree there is a fair bit of FUD, but at the end of the day, it comes to three factors:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1). Explainability and trust&lt;/P&gt;&lt;P&gt;2). AI Ethics and Governance&lt;/P&gt;&lt;P&gt;3). &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Purpose, transparency, and skills.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;If you cannot find answers to those, perhaps you should not be using that particular foundation model or provider.&amp;nbsp;&amp;nbsp; Also do you know what happens with your corporate data or your personal data - is it sold off or passed to the provider as a means of providing further rev&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;The main tenants within security is automation, AI continuously learns, improving its knowledge to understand cybersecurity threats and cyber risk by consuming billions of data artifacts.&amp;nbsp; AI reasoning finds threats easier - analysing relationships between threats like malicious files, suspicious IP addresses or insiders in seconds or minutes.&amp;nbsp; AI eliminates time-consuming tasks - curated risk analysis, reducing the time security analysts take to make critical decisions and remediate threats.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;AI will be used by the dark forces as well, conversely to create better means of compromising human beings or finding different weaknesses far quicker than humans can do so.&amp;nbsp; FraudGPT, and WormGPT are examples of services being offered by subscription on the dark web today.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Regards&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Caute_Cautim&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 02 Aug 2023 20:57:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Are-AI-Engineered-Threats-FUD-or-Reality/m-p/61372#M6307</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-08-02T20:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: Are AI-Engineered Threats FUD or Reality?</title>
      <link>https://community.isc2.org/t5/Industry-News/Are-AI-Engineered-Threats-FUD-or-Reality/m-p/61380#M6308</link>
      <description>&lt;P&gt;Just like using internet. Goods and bads. I would still prefer access to internet no matter what. We just need to be proactive in finding ways to use it for defence &lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Esin&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 03:55:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Are-AI-Engineered-Threats-FUD-or-Reality/m-p/61380#M6308</guid>
      <dc:creator>esin</dc:creator>
      <dc:date>2023-08-03T03:55:28Z</dc:date>
    </item>
    <item>
      <title>Re: Are AI-Engineered Threats FUD or Reality?</title>
      <link>https://community.isc2.org/t5/Industry-News/Are-AI-Engineered-Threats-FUD-or-Reality/m-p/61389#M6310</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1274424191"&gt;@esin&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; That does not bode well then, because if we can only detect 73% of the fakes, how will we deal with understanding whether it is real or not.&amp;nbsp; Social engineering just took on a new avenue and a race too, to see how many people can be compromised every day.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 04:49:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Are-AI-Engineered-Threats-FUD-or-Reality/m-p/61389#M6310</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-08-03T04:49:37Z</dc:date>
    </item>
  </channel>
</rss>

