Similar Posts
AI models inch closer to hacking on their own
ByKayne
The big picture: AI model operators don’t have a good way of reigning in these malicious use cases, Kayne McGladrey, a senior member of the Institute of Electrical and Electronics Engineers (IEEE), told Axios. Allowing LLMs to digest and train on CVE data can help defenders synthesize the wave of threat alerts coming their way each day. Operators have only two real choices in this type of situation: allow the models to train on security vulnerability data or completely block them from accessing vulnerability lists, he added. “It’s going to be a feature of the landscape because it is a dual-use technology at the end of the day,” McGladrey said.
A lack of communications enables breaches and helps derail cybersecurity projects
ByKayne
When planning any migration or deployment of new technology, businesses should carefully consider the best way to communicate the intent and need of the new technology to those users affected by it, as well as to those who work in supporting roles. This article will examine the effects of communication (and lack thereof) on two different client projects.
Twelve Essential Soft Skills for Early-Career Cybersecurity Professionals
ByKayne
In the realm of cybersecurity, early-career professionals often prioritize the development and demonstration of technical prowess. However, as someone with nearly three decades of experience in cybersecurity leadership roles, I firmly assert that interpersonal skills wield a profound influence over one’s career trajectory. Unlike certifications and degrees, which may lose relevance over time, interpersonal skills persist and can be cultivated through deliberate practice. This article sheds light on these often-overlooked attributes, providing a holistic perspective on what it takes to excel in cybersecurity beyond technical acumen.
Panel discussion at CES 2024: How Will AI Impact the Jobs of the Future?
ByKayne
Join Tom Coughlin, J.L. Doty, Gloria Washington, Kathleen Kramer and me as we explore the jobs we’ll see created over the next 20 years, industry’s role driving innovation and the skills our future workforce will need.
The ‘Internet of Payments’ puts ID security on the smartphone
ByKayne
When a “pay restroom” 100 miles from the nearest major city accepts frictionless mobile payments, stores that force buyers to wait a minute for a chip-and-PIN transaction seem dated, and cash-only transactions are inconvenient.
The Impact of Remote Work on Enterprise Security
ByKayne
IT and security response to the coronavirus pandemic was heroic. Although many organizations had some degree of remote-work capabilities pre-COVID-19, the past year brought this work to new levels.
Enterprise security has had to quickly evolve alongside the shift to remote work and cloud adoption. For example, companies successfully ramped up VPN infrastructure, shifted to online models of collaboration software, and re-examined security policies in light of a highly distributed workforce.