Displaying items by tag: countermeasures

Generative AI and LLM implementations have become widely adopted over the past 18 months, with some companies pushing to implement them as quickly as possible, according to search analytics company Elastic, which says this has expanded the attack surface and left developers and security teams without clear guidance on how to adopt emerging LLM technology safely.

Published in Security

GUEST OPINION by Joe Slowik, Gigamon Principal Security Engineer, Applied Threat Research: Data exfiltration exists as a cornerstone of malicious cyber operations, yet its nature and impact have changed significantly in recent years. Historically, adversaries linked to state sponsors or similar activities would engage in data theft to further goals of industrial espionage or intellectual property theft.

Published in Guest Opinion

Subscribe to Newsletter

*  Enter the security code shown: img0

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments