artificial intelligence
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/11113856/ai_business-400x200.jpg)
A step-by-step plan for safe use of GenAI models for software development
If you are a large-scale company, the recent AI boom hasn’t escaped your notice. Today AI is assisting in a large array of development-related and digital-related tasks, from …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/09140915/email-1600-400x200.jpg)
Clean links and sophisticated scams mark new era in email attacks
Analysis of 7 billion emails shows clean links are duping users, malicious EML attachments increased 10-fold in Q4, and social engineering attacks are at all-time highs, …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16165304/biometrics-1400-400x200.jpg)
Balancing “super app” ambitions with privacy
When Elon Musk’s ambitions to transform X into an “everything app” were divulged last year, he joined several companies known to be exploring or actively working on developing …
![Brad Arkin](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16111233/brad_arkin-2-salesforce-1-400x200.jpg)
Inside the strategy of Salesforce’s new Chief Trust Officer
Recently, Salesforce named Brad Arkin, previously Chief Security & Trust Officer at Cisco, the company’s new Chief Trust Officer. This was the perfect opportunity to find …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03114206/brain-400x200.jpg)
AI outsourcing: A strategic guide to managing third-party risks
In an era of artificial intelligence (AI) revolutionizing business practices, many companies are turning to third-party AI services for a competitive edge. However, this …
![teamwork](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/09153009/teamwork-cybersecurity-400x200.jpg)
Collaboration at the core: The interconnectivity of ITOps and security
In this Help Net Security video, Krista Macomber, Research Director at The Futurum Group, discusses how IT and security teams increasingly unite against cyber threats. …
![computer](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/25163441/computer-1-400x200.jpg)
AI PC shipments are expected to surpass 167 million units by 2027
Shipments of AI PCs – personal computers with specific system-on-a-chip (SoC) capabilities designed to run generative AI tasks locally – are expected to grow from nearly 50 …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/14123407/ai-robots-400x200.jpg)
How are state-sponsored threat actors leveraging AI?
Microsoft and OpenAI have identified attempts by various state-affiliated threat actors to use large language models (LLMs) to enhance their cyber operations. Threat actors …
![Matt Shelton](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16111231/matt_shelton-2-google-1-400x200.jpg)
Rise in cyberwarfare tactics fueled by geopolitical tensions
In this Help Net Security interview, Matt Shelton, Head of Threat Research and Analysis at Google Cloud, discusses the latest Threat Horizons Report, which provides …
![Fabric](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/12085024/fabric-open-source-ai-framework-400x200.jpg)
Fabric: Open-source framework for augmenting humans using AI
Fabric is an open-source framework, created to enable users to granularly apply AI to everyday challenges. Key features “I created it to enable humans to easily augment …
![data analytics](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11203453/data_analytics4-400x200.jpg)
How to take control of personal data
Cybercriminals increasingly use open-source intelligence (OSINT) to craft convincing backstories, often by mining social media profiles for details on a target’s …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/11141441/email-fire-1400-400x200.jpg)
Protecting against AI-enhanced email threats
Generative AI based on large language models (LLMs) has become a valuable tool for individuals and businesses, but also cybercriminals. Its ability to process large amounts of …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD