Category: Chatgpt
Securing AI
- by nlqip
With the proliferation of AI/ML enabled technologies to deliver business value, the need to protect data privacy and secure AI/ML applications from security risks is paramount. An AI governance framework model like the NIST AI RMF to enable business innovation and manage risk is just as important as adopting guidelines to secure AI. Responsible AI starts…
Read MoreThe content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. “Phantom hacker” scams — tech support-style scams that trick people into transferring money by falsely claiming their computer or online security is compromised…
Read MorePresley Rhodes makes a living posting what she calls “the subtle art of the thirst trap.” Popular on Instagram, she uses that platform to draw her most parched followers to OnlyFans where she can get paid. But what happens when a scammer buys access to those images? Nothing good. To hear what happened (and try…
Read MoreThe content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In a network assessment, one of the first tasks is to narrow down a large set of IP addresses to a list of…
Read MoreThe content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Comprehending and effectively addressing cybersecurity threats is paramount to organizational security. As artificial intelligence continues to evolve, how companies respond to cybersecurity threats…
Read MoreAdam Levin was a guest on Dark Rhiino’s Security Confidental podcast. In the episode, he encouraged listeners to protect both their security and their identities by “lying like a superhero.” Providing false or misleading information, accounts will be harder to break into in the event of a data breach. Listen to the episode below: Source…
Read MoreAT&T Cybersecurity featured a dynamic cyber mashup panel with Akamai, Palo Alto Networks, SentinelOne, and the Cloud Security Alliance. We discussed some provocative topics around Artificial Intelligence (AI) and Machine Learning (ML) including responsible AI and securing AI. There were some good examples of best practices shared in an emerging AI world like implementing Zero Trust architecture and…
Read MoreWe’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights Report: Focus on Energy and Utilities. The report examines the edge ecosystem, surveying energy and utilities IT leaders from around the world, and provides benchmarks for assessing your edge computing plans. This is the 12th edition of our vendor-neutral and forward-looking report. Last…
Read MoreWe’re pleased to announce our 2024 Partner of the Year awards. These annual awards recognize AT&T Cybersecurity partners that demonstrate excellence in growth, innovation, and implementation of customer solutions based on our AT&T USM Anywhere platform. AT&T Cybersecurity’s 2024 Global Partner of the Year award goes to Cybersafe Solutions for the second year in a…
Read MoreThe endpoint evolution – Evolving from traditional endpoints to cloud or containerized workloads and the security solutions to protect them
- by nlqip
As organizations grow and more endpoints are added across the enterprise, they create an increasingly broad attack surface sophisticated attackers are looking to compromise. According to the 2019 Endpoint Security Trends Report 70% of breaches originate at the endpoint¹. That is likely because endpoints typically represent the Intersection between humans and machines creating vulnerable points…
Read MoreRecent Posts
- Microsoft Partners Prepare For Automatic Switch To New Outlook
- Qualcomm: Return Rates For Snapdragon X PCs Are ‘Within Industry Norm’
- 8 Big Comments By Intel’s CEOs On Its AI, PC, Data Center And Foundry Efforts
- CISA Adds One Known Exploited Vulnerability to Catalog | CISA
- CISA and EPA Release Joint Fact Sheet Detailing Risks Internet-Exposed HMIs Pose to WWS Sector | CISA