Voice based phishing: The new cyber threat, supercharged by AI

We’re all familiar with phishing in our emails – spelling mistakes, slightly off email templates, poorly formed logic in the “ask”. Email perimeter screening products like Abnormal Security, Checkpoint, Mimecast, Proofpoint help combat this. But your personal or company mobile phone receiving a voice based phishing phone call? This is a different set of rules,

The Urgency of AI Governance: A Wake-Up Call from Google Gemini

Within the past 24 hours (November 16 2024), the United States and China have taken a significant step by agreeing to prohibit AI from controlling nuclear arms. This decision, as reported by Reuters https://www.reuters.com/world/biden-xi-agreed-that-humans-not-ai-should-control-nuclear-weapons-white-house-2024-11-16/, is crucial for ensuring the safety and ethical use of AI technology in high-risk/high-stakes domains. Its a step in the right

AI in Cybersecurity: From Netflix’s Chaos Engineering to Today’s Double-Edged Sword

Chaos Engineering can be traced back to 2003 when Amazon first introduced the concept with their GameDay initiative. In 2006, Google adopted and expanded upon the idea through their DiRT (Disaster Recovery Testing) program. However, it was Netflix that truly popularized and advanced Chaos Engineering, unveiling their groundbreaking Simian Army and Chaos Monkey programs in