You've requested...

Exploring the real-world misuse of generative AI by threat actors

If a new window did not open, click here to view this asset.

Download this next:

Accelerating Software Development with Generative AI: An IT Leader's Guide

AI coding assistants are mainstream, with 90% of developers using one for production-grade solutions in the last year.

IDC’s Leader’s Guide to Generative AI in the Software Development Life Cycle delves into more of the latest trends and insights on how developers are using AI tools and highlights the key advantages for IT leaders. Explore the many benefits and use cases across the development life cycle and learn which integrations have the biggest payoff.

These are also closely related to: "Exploring the real-world misuse of generative AI by threat actors"

  • AI Model Comparison: How to choose the best AI for you

    Navigating AI models can be daunting for businesses and developers. This white paper offers a comparison to help you choose the best fit for your needs.

    Key factors include:

    · Accuracy - How well the model performs tasks, like identifying customer sentiment
    · Speed - The model's ability to process information quickly, crucial for real-time applications
    · Scalability - Handling increasing data and tasks without losing performance
    · Cost - Balancing price with capabilities to fit your budget

    The paper tests Microsoft Azure AI, Google AI, and AWS for email analysis, examining their ability to summarize emails, understand sentiment, and draft responses.

    Discover which AI boosts service and efficiency.

  • Computer Weekly – 16 April 2024: VMware users hit by licence hikes after Broadcom takeover

    In this week’s Computer Weekly, VMware users are facing licence fee increases after the acquisition by Broadcom, with education bodies worst hit – we talk to unhappy customers. We visit Helsinki and find out why the Finnish capital is leading on smart city developments. And we examine how to reduce environmental impact through software development. Read the issue now.

Find more content like what you just read:

  • Migrate Workloads To The Public Cloud.

    This guide outlines a four-phase framework for cloud migration: assess, plan, migrate, and optimize. It covers strategies for workload migration, data considerations, and testing. Emphasizing thorough planning, it provides a checklist to help organizations navigate their cloud journey. Read this guide for a smooth transition to the public cloud.

    Download

  • AI for Customer Service: Exploring the latest technologies transforming contact centers

    Discover how AI can transform your contact center by streamlining processes, assisting agents, and reducing costs. Explore top AI use cases, the latest technologies, and strategies to mitigate risks. Read the white paper to learn how to start enhancing your contact center with AI.

    Download

  • New research explores AI's impact on unified communications

    Aragon Research evaluates 14 major providers in the intelligent unified communications and collaboration market. The report highlights AI assistants, omnichannel capabilities, and integrated communications for productivity. Key trends include intelligent agents and communication automation. Read for insights on vendors and market dynamics.

    Download

  • How Google saved $3bn by extending the life of their data center servers

    Recently, Alphabet reported a total of $2.9bn in savings on their server life extension, as well as a quarterly revenue of $77bn. This was due in part to the company extending the life of their data centre servers from 5 to 6 years. However, this has left many curious about the efficiency of these new operations. Browse this e-guide to learn more.

    Download

  • AI in cybersecurity: Deep learning, ML & more

    This eBook compares the differences between deep learning and machine learning tools for cybersecurity, helping you determine which makes the most sense for your business. Read the eBook here.

    Download

  • Accelerating generative AI-driven transformation with databases

    To become a frontrunner in the race to embrace generative AI, it's critical that you add operational databases to your game plan to start accelerating generative AI-driven transformation.

    Download

  • Better search, better business

    Generative AI is transforming the enterprise search experience. From customer-facing websites to internal data sets, organizations are powering up enterprise search to return relevant, actionable results that drive business value. Access this guide now to explore the tools enabling this next generation of search.

    Download

  • Computer Weekly – 21 May 2024: Can AI supercharge human creativity?

    In this week's Computer Weekly, we talk to Getty Images about the challenges of balancing human creativity with the risks and opportunities of GenAI. Our latest buyer's guide examines the best desktop IT management practices in a world of flexible working. And we review the benefits of open source software in the enterprise. Read the issue now.

    Download

  • Top tech stories of 2024: India (Part 1)

    India embraced AI in 2024, developing its own large language models, boosting supercomputing capabilities and applying the technology across sectors from healthcare to governance. In this round-up, we recap some of the key developments that kept chief information officers and technology suppliers across the subcontinent busy throughout the year.

    Download

  • Computer Weekly – 22 October 2024: Delivering Olympic IT

    In this week's Computer Weekly, we speak to a former Olympian and CIO of the Paris 2024 Olympic and Paralympic Games about continuous improvement. We also look at new enterprise AI services from major IT providers and assess the unified communications as a service market. Read the issue now.

    Download

  • Prevent Data Loss with Fortinet FortiDLP

    Securing data is more challenging than ever before. FortiDLP is a next-generation, AI-enhanced, cloud-native data protection solution that helps security teams anticipate and prevent data leaks, detect behavior-related insider risks, and train employees on proper cyber hygiene at the point of access to sensitive data.

    Download

  • Build a better cybersecurity defense: How AI & automation can help

    Cybersecurity experts battle AI threats like deepfakes. Many use outdated EDR tools, but prevention strategies are emerging. This report explores predictive prevention for pre-emptive defense. Discover how to preempt evolving cyber risks in the full report.

    Download

  • The 6 Principles of AI Ready Data

    In this white paper, you'll find out how to establish a trusted data foundation for AI with 6 key principles: data must be diverse, timely, accurate, secure, discoverable, and consumable by machine learning and large language models. Read on now to learn how you can unlock your organization's AI potential.

    Download

  • New report reveals cybercrime's growing threat to national security

    This white paper explores cybercrime as a national security threat, examining its impacts, support of state-sponsored activities, and effects on critical infrastructure. It analyzes the evolving cybercrime ecosystem and offers recommendations for a comprehensive approach. Read the full paper to grasp the complexity of this issue.

    Download

  • 103-page Report: Cybersecurity Takeaways and Tips

    In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.

    Download

  • Cyberthreat Predictions for 2025

    This threat predictions report examines how long-term cyberattack trends evolve, shares emerging threats to watch for in 2025, and more. Read on now to learn how Fortinet expects the threat landscape to change in the coming year and beyond and how these shifts will impact organizations and their security teams.

    Download

  • How Do I Bring Enterprise Data to Generative AI?

    This eBook shows how organizations can use MongoDB Atlas and Google Vertex AI to address challenges in generative AI development. It covers strategies for improving results, reducing hallucinations, and enhancing search while addressing scaling, security, and performance. Read the full eBook to boost your generative AI efforts.

    Download

  • Computer Weekly - 26 July 2022: Inside Russia's Ukraine information operations

    In this week's Computer Weekly, we get the inside track on Russia's disinformation operations attempting to spread propaganda and cyber threats about the invasion of Ukraine. Our new buyer's guide looks at customer and employee experience management. And we assess 10 top Kubernetes backup suppliers. Read the issue now.

    Download

  • Practical guide to using generative AI in the enterprise

    This data, from a 2024 Dataiku and Cognizant survey of 200 senior analytics and IT leaders, highlights that GenAI is a top priority at the highest level — nearly three-quarters of respondents (73%) will spend over $500,000 on the tech in the next 12 months.

    Download

  • The Future of SecOps in an AI-driven World

    Security operations are becoming easier thanks to tool consolidation, AI-powered threat detection, and upgraded security stacks. Learn how the future of SecOps is being shaped by these industry trends in this in-depth eBook.

    Download

  • Zscaler ThreatLabz Phishing Report reveals evolving threats

    Zscaler's Phishing Report analyzes the surge in AI-fueled phishing attacks, including vishing, deepfakes, and browser-in-the-browser tactics. Discover the latest phishing trends, targeted industries, and effective security measures to stay ahead of this evolving threat. Read the full report.

    Download

  • SaaS security in an AI-driven world: Key trends and challenges

    Modern SaaS security faces challenges like shadow IT, data exposure, and compliance. This white paper explores advanced solutions, emphasizing AI-powered visibility, zero-trust data protection, and unified context-driven policies. Discover how to secure your SaaS environment effectively in an AI-driven world by reading this comprehensive analysis.

    Download

  • Immediate ROI:
 Five Key Process Areas to Deploy Generative AI in Production

    It’s time to reimagine how people work with technology. Read this white paper to learn about the top 5 use cases for how generative AI can automate high-impact business processes in your organization to provide an immediate ROI on your investment by driving efficiency, reducing costs, and improving performance.

    Download

  • Safeguarding Your Data in a Work-From-Anywhere World

    Secure your data in a work-from-anywhere world with Zscaler's integrated data protection approach. Learn how to gain visibility, control, and compliance across cloud apps, endpoints, and public clouds. Read the white paper to discover Zscaler's comprehensive data security solution.

    Download

  • 118-page e-book: Mastering generative AI

    This 118-page e-book is a thorough guide to deploying GenAI applications. It details the entire GenAI process, from using foundation models to custom model pretraining and fine-tuning. Access the full e-book now to learn how you can unlock the potential of GenAI for your organization.

    Download

  • Computer Weekly – 4 August 2020: The UK's $500m space technology gamble

    In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.

    Download

  • Computer Weekly – 4 August 2020: The UK's $500m space technology gamble

    In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.

    Download

  • Computer Weekly – 9 June 2020: How retailers are staying connected during their coronavirus shutdown

    In this week's Computer Weekly, we look at how the hard-hit retail sector has turned to technology to stay connected during the coronavirus lockdown. Our latest buyer's guide examines best practice in data quality. And we look at how remote working affects software development teams.

    Download

  • Latest cybersecurity trends: Rise of RansomHub and new attack vectors

    This threat report examines key cybersecurity trends in H2 2024, including the rise of RansomHub as the leading ransomware-as-a-service, a surge in cryptostealers, and new mobile phishing tactics using PWAs. It also covers infostealer landscape shifts and emerging scams targeting online bookings. Read the full report for comprehensive insights.

    Download

  • Venafi Study: Machine Identities Drive Rapid Expansion of Enterprise Attack Surface

    Digital transformation strategies have led to an explosion of machines needing unique identities to connect securely. Read this study to learn why SSL/TLS, SSH and code signing machine identities so appeal to cybercriminals—and how an enterprise-wide machine identity management solution can stop them.

    Download

  • Unlocking the power of AI in HR

    Explore the transformative power of AI in HR and learn how it can elevate the employee experience. Read this guide to discover 7 ways AI benefits HR leaders today and gain insights on the future impact of AI.

    Download

  • Using Threat Intelligence to Improve Your Security Posture

    Threat intelligence helps organizations address cybersecurity risks by prioritizing and mitigating threats. This whitepaper explores types of threat intelligence, its sources, and how it's applied to improve security. Learn to leverage threat intelligence to strengthen your organization's defenses against evolving cyber threats.

    Download

  • 2023 recommendations to combat ransomware & extortion

    While much attention has been paid to ransomware in recent years, modern threat actors increasingly use additional extortion techniques to coerce targets into paying. Download this e-book to access executive recommendations from Unit42 to address the concerns of rising extortion and prepare yourself for the worst.

    Download

  • Top MITRE ATT&CK techniques from criminal/APT groups

    Download McAfee’s latest threat report to uncover their findings on Sunburst malware and the SolarWinds supply chain compromise, top MITRE ATT&CK techniques from criminal/APT groups, and much more.

    Download

  • Zscaler ThreatLabz 2023 State of Encrypted Attacks Report

    Encrypted attacks grew 24.3% year-over-year, with malware, ad spyware sites, and phishing making up 99% of threats. Education and government saw the largest increases. Learn how to defend against these evolving encrypted threats in the Zscaler ThreatLabz State of Encrypted Attacks Report.

    Download

  • Prevention first: Leveraging Cyber Threat Intelligence for Proactive Defense

    This white paper explores the role of cyber threat intelligence in proactive defense strategies. It examines challenges, benefits of prevention-first approaches, and how ESET's Threat Intelligence solutions enhance security. Learn to leverage CTI for effective threat mitigation and risk reduction. Read the full white paper for insights.

    Download

  • CISO Success Stories

    The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.

    Download

  • Incident Response Report 2024: Insights to Strengthen Your Defenses

    This Incident Response Report from Unit 42 by Palo Alto Networks provides insights into the latest threat actor tactics, techniques, and targets. Learn how to enhance your security posture, detect threats faster, and respond more effectively. Read the full report.

    Download

  • Incident Response Report 2024

    Download this e-book to learn how to empower your organization to proactively navigate cyber risks, strengthen security approaches, and respond to incidents with unmatched efficiency.

    Download

  • Top 5 security concerns for CISOs and how to address them

    This white paper explores 5 key security concerns for CISOs, including supply chain attacks, cloud security, and overloaded security teams. Get expert guidance on how to address these issues and prepare your organization for evolving cyberthreats. Read the full white paper to learn more.

    Download

  • Cybersecurity predictions and forecasts for 2025

    The Cybersecurity Forecast 2025 report provides forward-looking insights on AI-powered threats, ransomware, cloud security, and more. Inside, you'll gain expert insights on how defenders must adapt to evolving challenges in the year ahead. Read on now to understand the critical cybersecurity trends that will shape 2025.

    Download

  • Cybersecurity forecast 2025

    The Cybersecurity Forecast 2025 report offers insights from Google Cloud security leaders on emerging threats and trends. Topics include AI's impact, state actors, ransomware, cloud security, and compliance challenges. This analysis helps organizations strengthen their cybersecurity posture. Read the full white paper to prepare for threats.

    Download

  • CW APAC: Buyer’s guide to SASE

    Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.

    Download

  • In 2017, the insider threat epidemic begins

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

    Download

  • The Secrets of Successful CFOs

    This report reveals three key frontiers for successful CFOs: redefining influence beyond budgets, owning the tech-finance fusion, and balancing professional success with personal well-being. Learn how top finance leaders leverage technology, expand their roles, and maintain work-life balance. Read the full report for insights.

    Download

  • Actionable insights on the latest cybersecurity threats

    This Internet Security Report analyzes the latest network and endpoint threats, including malware trends, attack vectors, and ransomware. Learn how to secure remote access and build user trust by downloading this e-book.

    Download

  • Actionable insights on the latest cybersecurity threats

    This Internet Security Report analyzes the latest network and endpoint threats, including malware trends, attack vectors, and ransomware. Learn how to secure remote access and build user trust by downloading this e-book.

    Download