U.S. Rep. Bill Foster discusses the need for government intervention to ensure AI remains beneficial to society. AI-generated deepfakes already pose risks. "The challenge to government and society is to make sure that when AIs become powerful, they are on your side," he said.
Implementing a zero trust security approach is critical to avoid the types of major IT disruptions and massive data compromises seen in recent cyberattacks that affected the healthcare, public health and government sectors, said Clinton McCarty, CISO at National Government Services.
At ISMG's Cybersecurity Summit: North America Midwest, security leaders gathered to discuss AI's dual role in cybersecurity, regulatory challenges, cyber insurance strategies and emerging threats including deepfakes. The event featured critical insights on evolving threats and defense strategies.
U.S. federal agencies struggle to recruit and retain the next generation of cybersecurity talent, officials testified Wednesday, despite a range of initiatives meant to attract a diverse array of skills and perspectives to the cyber workforce.
Artificial intelligence is lowering the barriers of entry for global threat actors to create and deploy new chemical, biological and nuclear risks, warns the U.S. Department of Homeland Security. Current regulations and export controls fail to account for risks, the department said.
A Chinese state-sponsored group, tracked as RedJuliett, is using open-source VPN client SoftEther to target the infrastructure of about 75 organizations in government, academic and technology sectors in multiple countries. Most of the attacks appear to target Taiwan.
The U.S. Department of Defense is struggling to rapidly test and deploy emerging technologies due to a series of cybersecurity and workforce challenges that hinder the Pentagon's process of acquiring weapon systems, according to a new Government Accountability Office report.
Following a legal intervention made by the German federal cybersecurity agency, Microsoft has disclosed additional information on encryption measures it adopted to secure its customer data. A new white paper details how the company is deploying double key encryption.
Hackers Sagar Steven Singh and Nicholas Ceraolo pleaded guilty Monday in federal court to conspiring to commit computer intrusion and aggravated identity theft after illegally accessing a nonpublic law enforcement database, according to the Justice Department.
The Cybersecurity and Infrastructure Security Agency is hosting a series of tabletop exercises through its flagship public-private collaborative while developing a new playbook for both sectors to better respond to emerging cybersecurity risks associated with artificial intelligence.
The ransomware attack on a key U.K. National Health Service IT vendor has forced two London hospitals to reschedule around 1,500 medical appointments including critical cancer treatments and organ transplant surgeries. The disruption is now in its third week.
The U.S. Department of Health and Human Services is actively enhancing its cybersecurity measures to protect sensitive health data. CISO and Acting Deputy CIO La Monte Yarborough outlined the measures HHS is taking to protect sensitive data and critical infrastructure amid rising threats.
The U.S. National Institute of Standards and Technology wants public feedback on the first draft publication of a new project that aims to better secure the water and wastewater sectors from emerging cyberthreats by focusing on common concerns affecting operational technology assets.
Everfox's purchase of Garrison Technology is set to fortify its cybersecurity offerings, especially for government and critical infrastructure. The deal leverages Garrison's advanced hardware security technology to complement Everfox's existing capabilities in threat protection and insider risk.
The U.S. Department of Defense is looking to the private sector while aiming to strengthen its enterprisewide governance of artificial intelligence systems by issuing an open call for a commercial partner to help establish a road map for advising its diverse components on AI governance processes.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.