Third-Wave AI

CISOs: Are You Applying NIST / CISA Standards to ALL Data Including the Cloud?

Security leaders want to solve problems identifying and understanding anomalies or account access behaviors by correlating anomalous behaviors of specific accounts with other parameters like geography or ingress and egress points, but few rules-based Cybersecurity tools have the ability to do that without a great deal of manual data massaging and manipulating.

MixMode Invited to Participate on ‘US Blue Team’ in Annual International Cybersecurity Exercise

The constant threats posed by hackers, state-sponsored cyber attacks, and malicious actors have prompted the creation of cutting-edge strategies to fortify our nation’s cyber defenses. One such response to this growing concern comes in the form of an annual large-scale international cybersecurity exercise.

Gartner Security & Risk Management Summit 2023 Recap

One of the key predictions is that by 2027, 50% of chief information security officers (CISOs) will adopt human-centric design practices in their cybersecurity programs to minimize operational friction and maximize control adoption. This approach focuses on designing security controls around individuals rather than technology or threats. It recognizes that employees play a crucial role in cybersecurity and aims to reduce the likelihood of risky behavior.

Aligning an Organization’s Attack Surface to Detection Surface is Key to Adversary Defense in Today’s Cloud Era

With the Cloud Era, the IT asset estate has expanded, and there is a diverse set of attack surfaces to defend. The term “attack surface” describes the growing IT asset estate, but there is no parallel term to describe where we can detect or respond to attacker activity.

Top 5 Takeaways from the CISA 2023-2025 Strategic Plan That the Cybersecurity Community Should Know About

CISA identifies goals for the strategy as spearheading “the national effort to ensure the defense and resilience of cyberspace,” helping partners protect critical infrastructure, and supporting stronger “whole-of-nation operational collaboration and information sharing.” The strategy also outlines internal CISA goals focused on unification within the agency.

AI Offers Potential to Enhance The U.S. Department of Homeland Security

The establishment of the AI Task Force by the DHS demonstrates a commitment to harnessing the potential of AI in addressing emerging threats and safeguarding national security. By leveraging AI technology in various areas, such as supply chain integrity, countering drug trafficking, combating online child exploitation, and securing critical infrastructure, the DHS aims to stay ahead of evolving risks and protect the nation more effectively.

Forbes Technology Council: The Cybersecurity Implications Of ChatGPT And Third Wave Generative AI Models

Although generative models have been in development for some time, ChatGPT’s public release has raised important questions about the nature of these models, their potential impact, and their role in fields like cybersecurity. To understand their significance, Dr. Mezic explores the history and development of AI, distinguishes between the different waves of AI technology, and ultimately the implications for cybersecurity.

Webinar On-Demand: Meeting Federal Zero Trust Requirements with Third Wave Artificial Intelligence

Executive Order 14028, Improving the Nation’s Cybersecurity, directs decisive action to improve the Federal Government’s investigative and remediation capabilities. Specifically, it aims to galvanize public and private efforts to help identify, deter, protect against, detect, and respond to persistent and increasingly sophisticated malicious cyber campaigns.

Video: Modernizing Phoenix’s Cybersecurity to Combat Nation-State Attacks

Shannon Lawson, CISO for the City of Phoenix, and Geoffrey Coulehan, Head of Sales for MixMode recently joined forces for a fireside chat at the Evanta CISO Summit in Phoenix, AZ. Lawson and Coulehan have been partnering together for almost three years to transform the City’s cybersecurity initiatives and Security Operations Center (SOC).