Exploring the real-world misuse of generative AI by threat actors
By: Google View more from Google >>
Download this next:
Accelerating Software Development with Generative AI: An IT Leader's Guide
By: Google Cloud
Type: Analyst Report
AI coding assistants are mainstream, with 90% of developers using one for production-grade solutions in the last year.
IDC’s Leader’s Guide to Generative AI in the Software Development Life Cycle delves into more of the latest trends and insights on how developers are using AI tools and highlights the key advantages for IT leaders. Explore the many benefits and use cases across the development life cycle and learn which integrations have the biggest payoff.
These are also closely related to: "Exploring the real-world misuse of generative AI by threat actors"
-
Computer Weekly – 16 April 2024: VMware users hit by licence hikes after Broadcom takeover
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, VMware users are facing licence fee increases after the acquisition by Broadcom, with education bodies worst hit – we talk to unhappy customers. We visit Helsinki and find out why the Finnish capital is leading on smart city developments. And we examine how to reduce environmental impact through software development. Read the issue now.
-
AI Model Comparison: How to choose the best AI for you
By: Luware
Type: Buyer's Guide
Navigating AI models can be daunting for businesses and developers. This white paper offers a comparison to help you choose the best fit for your needs.
Key factors include:
· Accuracy - How well the model performs tasks, like identifying customer sentiment
· Speed - The model's ability to process information quickly, crucial for real-time applications
· Scalability - Handling increasing data and tasks without losing performance
· Cost - Balancing price with capabilities to fit your budgetThe paper tests Microsoft Azure AI, Google AI, and AWS for email analysis, examining their ability to summarize emails, understand sentiment, and draft responses.
Discover which AI boosts service and efficiency.
Find more content like what you just read:
-
Migrate Workloads To The Public Cloud.
By: Google Cloud
Type: Buyer's Guide
This guide outlines a four-phase framework for cloud migration: assess, plan, migrate, and optimize. It covers strategies for workload migration, data considerations, and testing. Emphasizing thorough planning, it provides a checklist to help organizations navigate their cloud journey. Read this guide for a smooth transition to the public cloud.
-
New research explores AI's impact on unified communications
By: Mitel
Type: Analyst Report
Aragon Research evaluates 14 major providers in the intelligent unified communications and collaboration market. The report highlights AI assistants, omnichannel capabilities, and integrated communications for productivity. Key trends include intelligent agents and communication automation. Read for insights on vendors and market dynamics.
-
AI for Customer Service: Exploring the latest technologies transforming contact centers
By: Luware
Type: White Paper
Discover how AI can transform your contact center by streamlining processes, assisting agents, and reducing costs. Explore top AI use cases, the latest technologies, and strategies to mitigate risks. Read the white paper to learn how to start enhancing your contact center with AI.
-
How Google saved $3bn by extending the life of their data center servers
By: Park Place
Type: eGuide
Recently, Alphabet reported a total of $2.9bn in savings on their server life extension, as well as a quarterly revenue of $77bn. This was due in part to the company extending the life of their data centre servers from 5 to 6 years. However, this has left many curious about the efficiency of these new operations. Browse this e-guide to learn more.
-
AI in cybersecurity: Deep learning, ML & more
By: Deep Instinct
Type: eBook
This eBook compares the differences between deep learning and machine learning tools for cybersecurity, helping you determine which makes the most sense for your business. Read the eBook here.
-
Accelerating generative AI-driven transformation with databases
By: Google Cloud
Type: White Paper
To become a frontrunner in the race to embrace generative AI, it's critical that you add operational databases to your game plan to start accelerating generative AI-driven transformation.
-
Better search, better business
By: Google Cloud
Type: eBook
Generative AI is transforming the enterprise search experience. From customer-facing websites to internal data sets, organizations are powering up enterprise search to return relevant, actionable results that drive business value. Access this guide now to explore the tools enabling this next generation of search.
-
Computer Weekly – 21 May 2024: Can AI supercharge human creativity?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to Getty Images about the challenges of balancing human creativity with the risks and opportunities of GenAI. Our latest buyer's guide examines the best desktop IT management practices in a world of flexible working. And we review the benefits of open source software in the enterprise. Read the issue now.
-
Top tech stories of 2024: India (Part 1)
By: TechTarget ComputerWeekly.com
Type: eGuide
India embraced AI in 2024, developing its own large language models, boosting supercomputing capabilities and applying the technology across sectors from healthcare to governance. In this round-up, we recap some of the key developments that kept chief information officers and technology suppliers across the subcontinent busy throughout the year.
-
Computer Weekly – 22 October 2024: Delivering Olympic IT
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we speak to a former Olympian and CIO of the Paris 2024 Olympic and Paralympic Games about continuous improvement. We also look at new enterprise AI services from major IT providers and assess the unified communications as a service market. Read the issue now.
-
Build a better cybersecurity defense: How AI & automation can help
By: Deep Instinct
Type: Research Content
Cybersecurity experts battle AI threats like deepfakes. Many use outdated EDR tools, but prevention strategies are emerging. This report explores predictive prevention for pre-emptive defense. Discover how to preempt evolving cyber risks in the full report.
-
Prevent Data Loss with Fortinet FortiDLP
By: Fortinet, Inc.
Type: Product Overview
Securing data is more challenging than ever before. FortiDLP is a next-generation, AI-enhanced, cloud-native data protection solution that helps security teams anticipate and prevent data leaks, detect behavior-related insider risks, and train employees on proper cyber hygiene at the point of access to sensitive data.
-
The 6 Principles of AI Ready Data
By: Qlik
Type: White Paper
In this white paper, you'll find out how to establish a trusted data foundation for AI with 6 key principles: data must be diverse, timely, accurate, secure, discoverable, and consumable by machine learning and large language models. Read on now to learn how you can unlock your organization's AI potential.
-
New report reveals cybercrime's growing threat to national security
By: Google
Type: White Paper
This white paper explores cybercrime as a national security threat, examining its impacts, support of state-sponsored activities, and effects on critical infrastructure. It analyzes the evolving cybercrime ecosystem and offers recommendations for a comprehensive approach. Read the full paper to grasp the complexity of this issue.
-
103-page Report: Cybersecurity Takeaways and Tips
By: Checkpoint Software Technologies
Type: Research Content
In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.
-
Cyberthreat Predictions for 2025
By: Fortinet, Inc.
Type: Essential Guide
This threat predictions report examines how long-term cyberattack trends evolve, shares emerging threats to watch for in 2025, and more. Read on now to learn how Fortinet expects the threat landscape to change in the coming year and beyond and how these shifts will impact organizations and their security teams.
-
How Do I Bring Enterprise Data to Generative AI?
By: Google Cloud and MongoDB
Type: eBook
This eBook shows how organizations can use MongoDB Atlas and Google Vertex AI to address challenges in generative AI development. It covers strategies for improving results, reducing hallucinations, and enhancing search while addressing scaling, security, and performance. Read the full eBook to boost your generative AI efforts.
-
Practical guide to using generative AI in the enterprise
By: Dataiku
Type: eBook
This data, from a 2024 Dataiku and Cognizant survey of 200 senior analytics and IT leaders, highlights that GenAI is a top priority at the highest level — nearly three-quarters of respondents (73%) will spend over $500,000 on the tech in the next 12 months.
-
Computer Weekly - 26 July 2022: Inside Russia's Ukraine information operations
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we get the inside track on Russia's disinformation operations attempting to spread propaganda and cyber threats about the invasion of Ukraine. Our new buyer's guide looks at customer and employee experience management. And we assess 10 top Kubernetes backup suppliers. Read the issue now.
-
The Future of SecOps in an AI-driven World
By: Google
Type: eBook
Security operations are becoming easier thanks to tool consolidation, AI-powered threat detection, and upgraded security stacks. Learn how the future of SecOps is being shaped by these industry trends in this in-depth eBook.
-
Zscaler ThreatLabz Phishing Report reveals evolving threats
By: Zscaler
Type: Research Content
Zscaler's Phishing Report analyzes the surge in AI-fueled phishing attacks, including vishing, deepfakes, and browser-in-the-browser tactics. Discover the latest phishing trends, targeted industries, and effective security measures to stay ahead of this evolving threat. Read the full report.
-
SaaS security in an AI-driven world: Key trends and challenges
By: Netskope
Type: White Paper
Modern SaaS security faces challenges like shadow IT, data exposure, and compliance. This white paper explores advanced solutions, emphasizing AI-powered visibility, zero-trust data protection, and unified context-driven policies. Discover how to secure your SaaS environment effectively in an AI-driven world by reading this comprehensive analysis.
-
Immediate ROI: Five Key Process Areas to Deploy Generative AI in Production
By: Kognitos, Inc.
Type: White Paper
It’s time to reimagine how people work with technology. Read this white paper to learn about the top 5 use cases for how generative AI can automate high-impact business processes in your organization to provide an immediate ROI on your investment by driving efficiency, reducing costs, and improving performance.
-
Safeguarding Your Data in a Work-From-Anywhere World
By: Zscaler
Type: eBook
Secure your data in a work-from-anywhere world with Zscaler's integrated data protection approach. Learn how to gain visibility, control, and compliance across cloud apps, endpoints, and public clouds. Read the white paper to discover Zscaler's comprehensive data security solution.
-
118-page e-book: Mastering generative AI
By: DataBricks
Type: eBook
This 118-page e-book is a thorough guide to deploying GenAI applications. It details the entire GenAI process, from using foundation models to custom model pretraining and fine-tuning. Access the full e-book now to learn how you can unlock the potential of GenAI for your organization.
-
Latest cybersecurity trends: Rise of RansomHub and new attack vectors
By: ESET
Type: Analyst Report
This threat report examines key cybersecurity trends in H2 2024, including the rise of RansomHub as the leading ransomware-as-a-service, a surge in cryptostealers, and new mobile phishing tactics using PWAs. It also covers infostealer landscape shifts and emerging scams targeting online bookings. Read the full report for comprehensive insights.
-
Computer Weekly – 9 June 2020: How retailers are staying connected during their coronavirus shutdown
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at how the hard-hit retail sector has turned to technology to stay connected during the coronavirus lockdown. Our latest buyer's guide examines best practice in data quality. And we look at how remote working affects software development teams.
-
Computer Weekly 4 August 2020: The UK's $500m space technology gamble
By: TechTarget ComputerWeekly.com
Type: eGuide
In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.
-
Computer Weekly 4 August 2020: The UK's $500m space technology gamble
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.
-
Unlocking the power of AI in HR
By: Sage
Type: eBook
Explore the transformative power of AI in HR and learn how it can elevate the employee experience. Read this guide to discover 7 ways AI benefits HR leaders today and gain insights on the future impact of AI.
-
Venafi Study: Machine Identities Drive Rapid Expansion of Enterprise Attack Surface
By: Venafi & Intel
Type: White Paper
Digital transformation strategies have led to an explosion of machines needing unique identities to connect securely. Read this study to learn why SSL/TLS, SSH and code signing machine identities so appeal to cybercriminals—and how an enterprise-wide machine identity management solution can stop them.
-
Using Threat Intelligence to Improve Your Security Posture
By: ESET
Type: White Paper
Threat intelligence helps organizations address cybersecurity risks by prioritizing and mitigating threats. This whitepaper explores types of threat intelligence, its sources, and how it's applied to improve security. Learn to leverage threat intelligence to strengthen your organization's defenses against evolving cyber threats.
-
2023 recommendations to combat ransomware & extortion
By: Palo Alto Networks Unit42
Type: eBook
While much attention has been paid to ransomware in recent years, modern threat actors increasingly use additional extortion techniques to coerce targets into paying. Download this e-book to access executive recommendations from Unit42 to address the concerns of rising extortion and prepare yourself for the worst.
-
Top MITRE ATT&CK techniques from criminal/APT groups
By: McAfee
Type: Research Content
Download McAfee’s latest threat report to uncover their findings on Sunburst malware and the SolarWinds supply chain compromise, top MITRE ATT&CK techniques from criminal/APT groups, and much more.
-
Zscaler ThreatLabz 2023 State of Encrypted Attacks Report
By: Zscaler
Type: Research Content
Encrypted attacks grew 24.3% year-over-year, with malware, ad spyware sites, and phishing making up 99% of threats. Education and government saw the largest increases. Learn how to defend against these evolving encrypted threats in the Zscaler ThreatLabz State of Encrypted Attacks Report.
-
CISO Success Stories
By: TechTarget ComputerWeekly.com
Type: eGuide
The cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.
-
Incident Response Report 2024: Insights to Strengthen Your Defenses
By: Palo Alto Networks
Type: Research Content
This Incident Response Report from Unit 42 by Palo Alto Networks provides insights into the latest threat actor tactics, techniques, and targets. Learn how to enhance your security posture, detect threats faster, and respond more effectively. Read the full report.
-
Incident Response Report 2024
By: Palo Alto Networks
Type: eBook
Download this e-book to learn how to empower your organization to proactively navigate cyber risks, strengthen security approaches, and respond to incidents with unmatched efficiency.
-
Prevention first: Leveraging Cyber Threat Intelligence for Proactive Defense
By: ESET
Type: White Paper
This white paper explores the role of cyber threat intelligence in proactive defense strategies. It examines challenges, benefits of prevention-first approaches, and how ESET's Threat Intelligence solutions enhance security. Learn to leverage CTI for effective threat mitigation and risk reduction. Read the full white paper for insights.
-
Top 5 security concerns for CISOs and how to address them
By: Palo Alto Networks
Type: White Paper
This white paper explores 5 key security concerns for CISOs, including supply chain attacks, cloud security, and overloaded security teams. Get expert guidance on how to address these issues and prepare your organization for evolving cyberthreats. Read the full white paper to learn more.
-
Cybersecurity predictions and forecasts for 2025
By: Google
Type: White Paper
The Cybersecurity Forecast 2025 report provides forward-looking insights on AI-powered threats, ransomware, cloud security, and more. Inside, you'll gain expert insights on how defenders must adapt to evolving challenges in the year ahead. Read on now to understand the critical cybersecurity trends that will shape 2025.
-
Cybersecurity forecast 2025
By: Google Cloud
Type: White Paper
The Cybersecurity Forecast 2025 report offers insights from Google Cloud security leaders on emerging threats and trends. Topics include AI's impact, state actors, ransomware, cloud security, and compliance challenges. This analysis helps organizations strengthen their cybersecurity posture. Read the full white paper to prepare for threats.
-
The Secrets of Successful CFOs
By: Sage
Type: White Paper
This report reveals three key frontiers for successful CFOs: redefining influence beyond budgets, owning the tech-finance fusion, and balancing professional success with personal well-being. Learn how top finance leaders leverage technology, expand their roles, and maintain work-life balance. Read the full report for insights.
-
In 2017, the insider threat epidemic begins
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.
-
CW APAC: Buyer’s guide to SASE
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.
-
Actionable insights on the latest cybersecurity threats
By: WatchGuard Technologies, Inc.
Type: Analyst Report
This Internet Security Report analyzes the latest network and endpoint threats, including malware trends, attack vectors, and ransomware. Learn how to secure remote access and build user trust by downloading this e-book.
-
Actionable insights on the latest cybersecurity threats
By: WatchGuard Technologies, Inc.
Type: Analyst Report
This Internet Security Report analyzes the latest network and endpoint threats, including malware trends, attack vectors, and ransomware. Learn how to secure remote access and build user trust by downloading this e-book.