Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The New Era of AI-Powered Application Security. Part Three: How Can Application Security Cope With The Challenges Posed by AI?

This is the third part of a blog series on AI-powered application security. Following the first two parts that presented concerns associated with AI technology, this part covers suggested approaches to cope with AI concerns and challenges. In my previous blog posts, I presented major implications of AI use on application security, and examined why a new approach to application security may be required to cope with these challenges.

Featured Post

Challenges in Securing Cloud Workloads

Cloud computing is nothing new in 2023, but is certainly still a growth piece of technology infrastructure, and one upon which many organisations work to build their IT infrastructure, whether across one cloud provider such as the market leaders AWS, or, increasingly, around a multi-cloud strategy across several providers, and some public cloud offerings.
Featured Post

The Zero-Trust Journey Every Organisation Must Make

Over the past decade, the working world has undergone a dramatic transformation. Spending each day of the week in an office is no more for most, while many have the flexibility to work from any location using a device and network that the organisation often has no control over. Productivity levels have certainly increased because of the flexible working environment, but it has opened the door to new challenges, mainly protecting the organisation's critical assets.

Artificial Intelligence Governance Professional Certification - AIGP

For anyone who follows industry trends and related news I am certain you have been absolutely inundated by the torrent of articles and headlines about ChatGPT, Google’s Bard, and AI in general. Let me apologize up front for adding yet another article to the pile. I promise this one is worth a read, especially for anyone looking for ways to safely, securely, and ethically begin introducing AI to their business.

What is SWIFT? 8 Things You Need to Know

In our increasingly digital world, global communications and financial interactions are nigh inescapable for anyone in any industry or walk of life. The infrastructure in place for international transactions is complex and layered, containing moving parts that work in tandem to make things like transferring money nearly seamless.

DSPM and CSPM: What are the Differences?

A few years back, data was constrained to the on-premise infrastructure. Data management, governance, and protection were fairly uncomplicated in this enclosed environment. The emergence of cloud computing and multi-cloud infrastructures has not only introduced more complexity in data management and governance, but it has also increased security risks significantly.