#ai-in-cybersecurity

[ follow ]
#security-operations-center
fromIT Pro
1 week ago
Artificial intelligence

Executives think AI can supercharge cybersecurity teams - analysts aren't convinced

There is a significant gap in AI confidence between cybersecurity executives and analysts.
fromIT Pro
1 week ago
Artificial intelligence

Executives think AI can supercharge cybersecurity teams - analysts aren't convinced

There is a significant gap in AI confidence between cybersecurity executives and analysts.
more#security-operations-center
#threat-detection
fromThe Hacker News
2 weeks ago
Artificial intelligence

Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left Behind

AI is rapidly transforming cybersecurity, necessitating skilled application by defenders.
While AI can enhance threat detection, improper implementation increases risks.
fromReadWrite
11 months ago
Artificial intelligence

How AI is Used in Proactive Cybersecurity Operations

AI is crucial for proactive cybersecurity operations, helping detect, prevent threats, and predict future attacks.
fromThe Hacker News
2 weeks ago
Artificial intelligence

Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left Behind

AI is rapidly transforming cybersecurity, necessitating skilled application by defenders.
While AI can enhance threat detection, improper implementation increases risks.
fromReadWrite
11 months ago
Artificial intelligence

How AI is Used in Proactive Cybersecurity Operations

AI is crucial for proactive cybersecurity operations, helping detect, prevent threats, and predict future attacks.
more#threat-detection
fromTechRepublic
1 month ago
beer

Agentic AI's Role in the Future of AppSec | TechRepublic

Agentic AI automates tedious tasks in application security, enabling faster remediation and more secure software.
#cyber-threats
fromZDNET
1 month ago
Privacy professionals

Navigating AI-powered cyber threats in 2025: 4 expert security tips for businesses

Cybercriminals leverage AI to enhance the precision and effectiveness of cyberattacks, making security strategies more critical than ever.
fromThe Hacker News
8 months ago
Information security

How Phishing Attacks Adapt Quickly to Capitalize on Current Events

Phishing attacks surged in 2023 with AI and PhaaS playing major roles in crafting malicious content and enabling quick responses to changing events.
Privacy professionals
fromZDNET
1 month ago

Navigating AI-powered cyber threats in 2025: 4 expert security tips for businesses

Cybercriminals leverage AI to enhance the precision and effectiveness of cyberattacks, making security strategies more critical than ever.
Information security
fromThe Hacker News
8 months ago

How Phishing Attacks Adapt Quickly to Capitalize on Current Events

Phishing attacks surged in 2023 with AI and PhaaS playing major roles in crafting malicious content and enabling quick responses to changing events.
more#cyber-threats
#cybersecurity
fromITPro
7 months ago
Information security

Securing your business with education and training

Cybersecurity education and training are crucial for employee preparedness against evolving cyber threats.
fromITPro
7 months ago
Information security

Securing your business with education and training

Cybersecurity education and training are crucial for employee preparedness against evolving cyber threats.
more#cybersecurity
Information security
fromTheregister
6 months ago

Researchers unveil LLM tool to find Python zero-days

Vulnhuntr is a new open-source tool that detects zero-day vulnerabilities in Python codebases using Claude AI, improving accuracy over traditional analyzers.
Artificial intelligence
fromFedScoop
6 months ago

CISA official: AI tools 'need to have a human in the loop'

CISA is developing AI security initiatives, emphasizing the importance of human oversight in cybersecurity processes despite the hype around AI technology.
Artificial intelligence
fromSiliconANGLE
8 months ago

AI transforms network security amid remote work challenges - SiliconANGLE

AI is pivotal in transforming network security by leveraging network devices and telemetry data to provide insights and recommendations.
[ Load more ]