Third Wave AI

Navigating the Maze: A Measured Approach to AI Adoption in Cybersecurity

While a significant portion (53%) of respondents acknowledge their organization’s early-stage adoption of AI, only 18% report full deployment into integrated security programs. This cautious approach reflects the need for careful planning and implementation to ensure AI enhances, rather than hinders, security posture.

The AI Advantage: Mitigating the Security Alert Deluge in a Talent-Scarce Landscape

The cybersecurity landscape is under siege. Organizations are bombarded by a relentless barrage of security alerts, often exceeding a staggering 22,111 per week on average. While Artificial Intelligence (AI) has emerged as a powerful tool to manage this overwhelming volume, its effectiveness isn’t without limitations, as vendors flood the market with false advertising and promises.

Whitepaper: OVERCOMING THE LIMITS OF LEGACY DETECTION TOOLS IN TODAY’S THREAT LANDSCAPE WITH ADVANCED AI

The history of cybersecurity is a tale of constant evolution, marked by the rise and fall of various defense mechanisms in the face of ever-changing threats. Security tools such as antivirus software and firewalls have long been the stalwarts of cyber defense, forming the bedrock of protection for organizations worldwide. While effective in their time, …

Whitepaper: OVERCOMING THE LIMITS OF LEGACY DETECTION TOOLS IN TODAY’S THREAT LANDSCAPE WITH ADVANCED AI Read More →

Understanding the Joe Biden Executive Order on AI and Enhancing Cybersecurity: Key Takeaways and Recommendations

On October 30, 2023, the White House issued an Executive Order promoting safe, secure, and trustworthy artificial intelligence (AI) deployment. This Executive Order recognizes the global challenges and opportunities presented by AI and emphasizes the need for collaboration, standards development, and responsible government use for national security.

CISOs: Are You Applying NIST / CISA Standards to ALL Data Including the Cloud?

Security leaders want to solve problems identifying and understanding anomalies or account access behaviors by correlating anomalous behaviors of specific accounts with other parameters like geography or ingress and egress points, but few rules-based Cybersecurity tools have the ability to do that without a great deal of manual data massaging and manipulating.

Aligning an Organization’s Attack Surface to Detection Surface is Key to Adversary Defense in Today’s Cloud Era

With the Cloud Era, the IT asset estate has expanded, and there is a diverse set of attack surfaces to defend. The term “attack surface” describes the growing IT asset estate, but there is no parallel term to describe where we can detect or respond to attacker activity.

AI Offers Potential to Enhance The U.S. Department of Homeland Security

The establishment of the AI Task Force by the DHS demonstrates a commitment to harnessing the potential of AI in addressing emerging threats and safeguarding national security. By leveraging AI technology in various areas, such as supply chain integrity, countering drug trafficking, combating online child exploitation, and securing critical infrastructure, the DHS aims to stay ahead of evolving risks and protect the nation more effectively.

Forbes Technology Council: The Cybersecurity Implications Of ChatGPT And Third Wave Generative AI Models

Although generative models have been in development for some time, ChatGPT’s public release has raised important questions about the nature of these models, their potential impact, and their role in fields like cybersecurity. To understand their significance, Dr. Mezic explores the history and development of AI, distinguishes between the different waves of AI technology, and ultimately the implications for cybersecurity.