Category Archives: Uncategorized

A Call to Arms: Information Security’s vital role on the AI battlefield

In a world racing toward an AI-powered future, the landscape is changing at breakneck speed. ChatGPT was launched by OpenAI on 30 Nov 2022. A mere 10 months later, it is making millions of people look cleverer. It boosts productivity and creativity, and saves time. Most use ChatGPT-3.5 the free version, but already a more powerful, ChatGPT-4 subscriber version is available. ChatGPT is not alone, other tech giants are rushing full-speed ahead with their own AI offerings: Meta has Llama, Palantir have AIP, Tesla launched FSD v12 this week, Google has PaLM, Adobe has Sensei, Baidu unveiled Ernie Bot in March, and others such as Microsoft, Amazon, C3.ai, Snowflake, IBM, Nvidia, and Intel, all have their own AI developments.  

Continue reading

Navigating security challenges in the age of Large Language Models

Large Language Models (LLMs) have brought about significant advancements in text, image, music and code generation. It is a mere 10 months since the launch of ChatGPT and millions have glimpsed the enormous potential to boost productivity and efficiency, and to aid creative ideation. As LLMs and Generative AI (GenAI) technologies become increasingly prevalent, they usher in an exciting new era of possibilities for human-computer interactions.

Continue reading

Next generation security: Powered by AI and providing predictive capability

Using AI to protect end user computing is not new. Back in 2014, I was granted a US technology patent in the use of machine learning to identify phishing web pages. The technology proved more accurate than other contemporary anti-phishing measures.

Continue reading

Unlocking Synergies with Blockchain Technology and AI

The convergence of blockchain technology and artificial intelligence (AI) has the potential to revolutionize various industries, creating new opportunities and transforming existing processes. This powerful amalgamation offers a host of benefits, including enhanced security, increased transparency, and improved efficiency. By harnessing the capabilities of blockchain and AI, innovative applications can emerge, paving the way for a future marked by decentralized and intelligent systems. Here we delve into the promising possibilities that arise from the fusion of these transformative technologies.

Continue reading

The growing threat: AI-driven malware poses serious challenges to cybersecurity

In recent years, the proliferation of artificial intelligence (AI) has revolutionized various industries, empowering them with unprecedented capabilities and efficiency. Unfortunately, just as legitimate industries harness AI for beneficial purposes, the realm of cybercrime has also recognized its potential. Malware developers are now incorporating AI into their malicious creations, resulting in a new breed of threats that possess enhanced evasion techniques and adaptability. This article explores the dangers associated with the marriage of AI and malware, shedding light on the imminent challenges it presents to cybersecurity professionals.

Continue reading

Russian aggression – this is what’s coming next

For some, it occurred when Russian tanks crossed the Ukrainian border after assurances that they were merely conducting training maneuvers. For some it occurred when Russian military deliberately targeted civilians. For some it was the shelling of a maternity hospital or a Mariupol theatre with дети displayed outside. For some it was the false flag setup for chemical weapon attack or the reckless shelling of nuclear facilities. Putin has crossed his Rubicon.

Continue reading

Deepfake – fake news on steriods

Using Photoshop to alter images to make the subject look thinner, healthier or more attractive, has become so endemic that the word has entered the lexicon as a verb, adjective and noun. Advancements in AI, specifically deep learning using artificial neural networks, have taken this activity to a potentially more harmful level. Last season’s liposuction of bimbo belly fat has become this season’s complete head transplants of politicians and celebrities. Continue reading

What does the ‘hybrid workplace’ mean for cyber security?

The hybrid workplace is becoming the new buzzword as companies look towards the coming months. Enabling employees to work some of the time remotely, and some of the time in the office seems like a sensible approach. But while it minimises Covid risks, the question we should be asking, is whether it might expose organisations to greater risks from cyberattacks. Continue reading

New Year, Heightened Cyber Risks

For all of us the idea that we close 2020 and start 2021 afresh is appealing. But it will not happen. The impact of Covid-19 will reach into the New Year, even as we pin our hopes on a vaccine. And in the cybersecurity world, we are now preparing for an onslaught of new and inventive attacks that prey on these hopes and bring further challenges for individuals and for companies. Continue reading

Manage endpoints to protect the weakest link in the security chain

What do we understand by endpoints? Traditionally, an endpoint was any device connected to the LAN or WAN such as a workstation or end-user PC, a modem, a hub or a switch. Now endpoints incorporate a multitude of additional digital devices from laptops, tablets and mobile phones sitting on the edge of the network, to network printers, consumer and industrial IoT devices and point-of-sale systems. Securing this ever-expanding portfolio has become urgent because these devices represent a significant risk to the cloud ecosystem and the global enterprises that are on or moving towards it.

Continue reading