<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Manage AI threats with the right technology architecture in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Manage-AI-threats-with-the-right-technology-architecture/m-p/71513#M6933</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In an increasingly digital world, companies continuously face the threat of cyberattacks. Current advances in &lt;A href="https://www.ibm.com/topics/artificial-intelligence" target="_blank" rel="noopener nofollow"&gt;&lt;SPAN class=""&gt;artificial intelligence&lt;/SPAN&gt; (AI)&lt;/A&gt; promise significant improvements in detecting and defending against such threats.&lt;/P&gt;&lt;P&gt;However, it is no secret that attackers are increasingly using AI. Cyber criminals leverage AI and machine learning to optimize and automate attacks. AI-driven malware can quickly adapt to new security measures and exploit vulnerabilities in real time. These AI tools enable cyber criminals to scale their attacks and employ highly complex methods to bypass traditional security mechanisms and remain undetected. Additionally, attackers use advanced algorithms to make &lt;A href="https://www.ibm.com/topics/phishing" target="_blank" rel="noopener nofollow"&gt;phishing&lt;/A&gt; attacks more precise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this context, Palo Alto Networks (PANW) recently announced the acquisition of IBM’s QRadar Software-as-a-Service (SaaS) business. This marks the second merger in the traditional security information and event management (SIEM) market this year, following the merger of Exabeam and LogRhythm. These developments followed Cisco’s earlier acquisition of Splunk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityintelligence.com/posts/manage-ai-threats-with-technology-architecture/" target="_blank" rel="noopener"&gt;https://securityintelligence.com/posts/manage-ai-threats-with-technology-architecture/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Thu, 27 Jun 2024 05:58:36 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-06-27T05:58:36Z</dc:date>
    <item>
      <title>Manage AI threats with the right technology architecture</title>
      <link>https://community.isc2.org/t5/Industry-News/Manage-AI-threats-with-the-right-technology-architecture/m-p/71513#M6933</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In an increasingly digital world, companies continuously face the threat of cyberattacks. Current advances in &lt;A href="https://www.ibm.com/topics/artificial-intelligence" target="_blank" rel="noopener nofollow"&gt;&lt;SPAN class=""&gt;artificial intelligence&lt;/SPAN&gt; (AI)&lt;/A&gt; promise significant improvements in detecting and defending against such threats.&lt;/P&gt;&lt;P&gt;However, it is no secret that attackers are increasingly using AI. Cyber criminals leverage AI and machine learning to optimize and automate attacks. AI-driven malware can quickly adapt to new security measures and exploit vulnerabilities in real time. These AI tools enable cyber criminals to scale their attacks and employ highly complex methods to bypass traditional security mechanisms and remain undetected. Additionally, attackers use advanced algorithms to make &lt;A href="https://www.ibm.com/topics/phishing" target="_blank" rel="noopener nofollow"&gt;phishing&lt;/A&gt; attacks more precise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this context, Palo Alto Networks (PANW) recently announced the acquisition of IBM’s QRadar Software-as-a-Service (SaaS) business. This marks the second merger in the traditional security information and event management (SIEM) market this year, following the merger of Exabeam and LogRhythm. These developments followed Cisco’s earlier acquisition of Splunk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityintelligence.com/posts/manage-ai-threats-with-technology-architecture/" target="_blank" rel="noopener"&gt;https://securityintelligence.com/posts/manage-ai-threats-with-technology-architecture/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2024 05:58:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Manage-AI-threats-with-the-right-technology-architecture/m-p/71513#M6933</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-06-27T05:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: Manage AI threats with the right technology architecture</title>
      <link>https://community.isc2.org/t5/Industry-News/Manage-AI-threats-with-the-right-technology-architecture/m-p/71524#M6934</link>
      <description>&lt;P&gt;There is at least one US patent that I know of that actually automates spear-phishing. &lt;A href="https://patents.google.com/patent/US9882932B2/en" target="_blank"&gt;https://patents.google.com/patent/US9882932B2/en&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This isn't new. We've actually been dealing with it for years. But with the public release of AI tools, this increases the possibilities exponentially.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our best defenses include:&lt;/P&gt;&lt;P&gt;* Understanding the psychology&lt;/P&gt;&lt;P&gt;* Understanding how AI works&lt;/P&gt;&lt;P&gt;* Critical thinking&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lee Kim&lt;/P&gt;&lt;P&gt;ISC2 board of directors candidate&lt;/P&gt;&lt;P&gt;Non-profit professional, attorney, and advocate&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.linkedin.com/in/leekim" target="_blank"&gt;www.linkedin.com/in/leekim&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2024 15:26:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Manage-AI-threats-with-the-right-technology-architecture/m-p/71524#M6934</guid>
      <dc:creator>leekimjd</dc:creator>
      <dc:date>2024-06-27T15:26:03Z</dc:date>
    </item>
  </channel>
</rss>

