Cyber security professionals can use generative AI to better defend against the attackers who are using the same AI tools to create attacks. When people engage in the artificial intelligence (AI) debate, top of the list of concerns is often the intellectual property (IP) and copyright issue, especially regarding code generation or creative outputs from […]
Continue readingMore TagTag: Cybersecurity
The road to Zero Trust not necessarily paved with gold
As discussed in my first article in this series, whilst Zero Trust must be the goal, there are a few potholes to navigate on the journey. Let me expand slightly more on these caveats, but also expose the greatest ally of Zero Trust. Paul Meyer. Peer to peer (P2P) technologies – prevalent in the […]
Continue readingMore TagWhy Zero Trust must be an essential part of cybersecurity strategy
In the early days of computing, security was relatively simple since computers were isolated entities. Physical security was sufficient, with authorised users being granted access to a computer room. However, with the advent of computer networking and the internet, security became more complex. The concept of a physical perimeter protecting the network emerged, one could […]
Continue readingMore Tag