Navigating the Complex Web of Identity and Artificial Intelligence in 2024
December 2023 by Jordan Avnaim
As another year draws to a close, it’s time to start thinking about what trends and challenges may face us in 2024. Next year promises to be a pivotal moment in the evolution of identity management and the integration of artificial intelligence (AI).
Navigating the Nexus: Unraveling Cybersecurity Threats to Artificial Intelligence
November 2023 by Dr. Pali Surdhar
In the digital age, the symbiotic relationship between artificial intelligence (AI) and cybersecurity is undeniable. As AI technologies advance, so do the methods and tactics employed by malicious actors seeking to exploit vulnerabilities.
It seems you can’t go anywhere today without artificial intelligence (AI) creeping into the conversation. Billed by some as being as, or potentially more disruptive than the internet, AI and machine learning (ML) are laying the foundation for the next digital age, whether we’re ready or not.
Generative AI Security Challenges – Fighting Fire With Fire
September 2023 by Greg Wetmore
Generative AI has emerged as a transformative force. These advanced large language models can autonomously create content ranging from text to images and even music, offering unprecedented capabilities for creativity and innovation.
NIST Delivers the Draft Standards for Post-quantum Cryptography
August 2023 by Samantha Mabey
The starting whistle has gone off in the race for quantum-safe cryptography solutions. Last week, the National Institute of Standards and Technology (NIST) released their draft standards for post-quantum cryptography (PQC).
NIST Standards for Post-quantum Cryptography Are Coming Soon. What Does This Mean for Enterprises?
July 2023 by Greg Wetmore
With many countries all over the world launching strategic funding programs and the largest technology companies leading development efforts, the threat of quantum computers to cryptography is not a matter of “if”, but “when.”
When it comes to Zero Trust, the conversation has moved from being a nebulous term several years ago to a well-understood framework with a true north that has broad acceptance across the cybersecurity industry.