* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Sunday, July 27, 2025
Earth-News
  • Home
  • Business
  • Entertainment
    Top 5 entertainment news: Sandeep Reddy Vanga regrets trimming Animal’s runtime by 7-8 minutes, Akshay Ku – Times of India

    Top 5 Entertainment Highlights: Sandeep Reddy Vanga Reveals Why He Trimmed Animal’s Runtime by 7-8 Minutes, Plus Akshay Ku Updates

    Cote de Pablo reveals how Michael Weatherly used his soap opera roots to put her at ease in “NCIS” love scene – yahoo.com

    Cote de Pablo Reveals How Michael Weatherly’s Soap Opera Background Made Their “NCIS” Love Scene Easier

    City of Pelham announces entertainment district plans for former Oak Mountain Amphitheatre site – WVTM

    Pelham Unveils Exciting New Entertainment District Plans for Former Oak Mountain Amphitheatre Site

    Black Box Players presents ‘The Three Musketeers’ – CBS 19 News

    Experience the Adventure: Black Box Players Bring ‘The Three Musketeers’ to Life!

    AP Entertainment SummaryBrief at 1:51 p.m. EDT – Channel 3000

    Entertainment Highlights: Key Updates You Can’t Miss

    ‘Devil Wears Prada 2’ casts Anne Hathaway’s love interest replacing Adrian Grenier’s Nate – Entertainment Weekly

    Devil Wears Prada 2′ Casts New Love Interest for Anne Hathaway, Replacing Adrian Grenier’s Nate

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    AI’s race in the dark with China – Axios

    The High-Stakes AI Race: Innovation and Competition in the Shadows

    Eagle Unveils Revolutionary X-Ray Technology at Pack Expo

    Validea’s Top Information Technology Stocks Based On Peter Lynch – 7/25/2025 – Nasdaq

    Validea’s Top Information Technology Stocks Based On Peter Lynch – 7/25/2025 – Nasdaq

    WhoFi: New surveillance technology can track people by how they disrupt Wi-Fi signals – Tech Xplore

    WhoFi: New surveillance technology can track people by how they disrupt Wi-Fi signals – Tech Xplore

    Google Cloud Announced as a Key Technology Partner for Odoo Connect 2025 in San Francisco – GlobeNewswire

    Google Cloud Announced as a Key Technology Partner for Odoo Connect 2025 in San Francisco – GlobeNewswire

    Behind the Screens: The Impact of Technology on Real Estate – TRREB

    Behind the Screens: How Technology is Transforming the Future of Real Estate

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment
    Top 5 entertainment news: Sandeep Reddy Vanga regrets trimming Animal’s runtime by 7-8 minutes, Akshay Ku – Times of India

    Top 5 Entertainment Highlights: Sandeep Reddy Vanga Reveals Why He Trimmed Animal’s Runtime by 7-8 Minutes, Plus Akshay Ku Updates

    Cote de Pablo reveals how Michael Weatherly used his soap opera roots to put her at ease in “NCIS” love scene – yahoo.com

    Cote de Pablo Reveals How Michael Weatherly’s Soap Opera Background Made Their “NCIS” Love Scene Easier

    City of Pelham announces entertainment district plans for former Oak Mountain Amphitheatre site – WVTM

    Pelham Unveils Exciting New Entertainment District Plans for Former Oak Mountain Amphitheatre Site

    Black Box Players presents ‘The Three Musketeers’ – CBS 19 News

    Experience the Adventure: Black Box Players Bring ‘The Three Musketeers’ to Life!

    AP Entertainment SummaryBrief at 1:51 p.m. EDT – Channel 3000

    Entertainment Highlights: Key Updates You Can’t Miss

    ‘Devil Wears Prada 2’ casts Anne Hathaway’s love interest replacing Adrian Grenier’s Nate – Entertainment Weekly

    Devil Wears Prada 2′ Casts New Love Interest for Anne Hathaway, Replacing Adrian Grenier’s Nate

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    AI’s race in the dark with China – Axios

    The High-Stakes AI Race: Innovation and Competition in the Shadows

    Eagle Unveils Revolutionary X-Ray Technology at Pack Expo

    Validea’s Top Information Technology Stocks Based On Peter Lynch – 7/25/2025 – Nasdaq

    Validea’s Top Information Technology Stocks Based On Peter Lynch – 7/25/2025 – Nasdaq

    WhoFi: New surveillance technology can track people by how they disrupt Wi-Fi signals – Tech Xplore

    WhoFi: New surveillance technology can track people by how they disrupt Wi-Fi signals – Tech Xplore

    Google Cloud Announced as a Key Technology Partner for Odoo Connect 2025 in San Francisco – GlobeNewswire

    Google Cloud Announced as a Key Technology Partner for Odoo Connect 2025 in San Francisco – GlobeNewswire

    Behind the Screens: The Impact of Technology on Real Estate – TRREB

    Behind the Screens: How Technology is Transforming the Future of Real Estate

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Technology

Five ways CISOs are using AI to protect their employees’ digital devices and identities

September 13, 2023
in Technology
Five ways CISOs are using AI to protect their employees’ digital devices and identities
Share on FacebookShare on Twitter

September 12, 2023 12:59 PM

Image Credit: albund/Shutterstock

Head over to our on-demand library to view sessions from VB Transform 2023. Register Here

Using generative AI to automate scripts seeking unprotected endpoints, ports and infrastructure security gaps, cybercrime gangs offer bounties for targeted organizations’ employee digital device passwords and identities. As many recent attacks show, putting any trust in identities is a breach waiting to happen. 

Notably, digital and physical crime in healthcare has long been converging and growing into a pandemic. Healthcare providers warn their employees not to leave their laptops in their cars unattended. The Coplin Health incident in which 43,000 records containing personal health information (PHI) were compromised after an employee’s laptop was stolen from their car is still a concern boards mention regarding identity security. A stolen laptop with unencrypted PHI data can often lead to a $1 million settlement based on HIPAA violations alone. 

Attacks on employees’ digital devices and identities are soaring

Healthcare CISOs tell VentureBeat that attempts to steal employees’ digital devices are soaring because PHI records command the highest prices on the dark web and are untraceable. The U.S. Department of Health and Human Services (HHS) Breach Portal shows that in the last eighteen months alone, 799 healthcare providers have been breached, 551 of them experiencing a server-based attack and 173 email-based in which laptops were used to gain access. 

CrowdStrike’s cofounder and CEO George Kurtz said in his keynote at last year’s Fal.Con that “80% of the attacks or the compromises that we see use some form of identity and credential theft.”

Event

VB Transform 2023 On-Demand

Did you miss a session from VB Transform 2023? Register to access the on-demand library for all of our featured sessions.

Register Now

The Identity Defined Security Alliance (IDSA)’s 2023 Trends in Securing Digital Identities report found that 90% of organizations experienced at least one identity-related breach in the past year, representing a 7.1% increase year-over-year.

Getting ready for automated attacks that weaponize AI at scale

Deepfake attacks are so pervasive that the Department of Homeland Security provides the guide Increasing Threats of Deepfake Identities, which outlines how to counter them. VentureBeat has learned of several attempted deepfake attacks on leading enterprise software CEOs that follow the same attack pattern in which Zscaler CEO Jay Chaudhyr’s voice was used to extort funds from the company’s India-based operations.

Chaudhry, Kurtz and CEOs of top cybersecurity companies agree that stolen identities and privileged access credentials are customers’ biggest threats. The Finnish Transport and Communications Agency National Cyber Security Centre and WithSecure commissioned a study to predict AI-enabled cyberattacks, as shown below.

Generative AI improves social engineering and credential theft skills, creating weaponized AI that can launch automated, resilient identity attacks. Source: Finnish Transport and Communications Agency.

How CISOs are using AI to protect employees’ identities 

Security teams and the CISOs leading them can’t afford to lose the AI war. The following five AI and machine learning (ML) techniques have become table stakes for stopping identity-based attacks:

Getting a more precise count, location and telemetry of all endpoints, machines and associated identities

Cybersecurity and IT teams often can’t locate 35% to 40% of their endpoints and machines. With the proliferation of new identities assigned to endpoints and the resulting unchecked agent sprawl, attackers’ reconnaissance efforts quickly find over configured endpoints.  

Endpoint sprawl makes identity breaches harder to stop. Six in 10 (59%) endpoints have at least one identity and access management (IAM) agent, and 11% have two or more. These and other findings from Absolute Software’s 2023 Resilience Index illustrate the false sense of security organizations have in security tools.

The Index found that many endpoint controls aren’t installed correctly, leaving 25 to 30% of devices vulnerable to attack. Treating every identity as a new security perimeter, enforcing least privileged access, monitoring every transaction and going all in on zero trust for every endpoint must be a priority.

Moving beyond mobile device VPNs and standardizing AI-enabled Mobile Threat Defense (MTD)

In a recent interview with VentureBeat, Ivanti chief product officer Srinivas Mukkamala noted that, “increasingly, our cell phones contain our whole lives. At the heart of modern device management organizations [protecting] data everywhere work happens, especially work that is happening on personal devices.” 

Mukkamala’s comments reflect what VentureBeat hears from CISOs in healthcare, manufacturing and financial services, in which mobile devices are frequently an attack target.

Mukkamala advised that “there is a continued need to more easily control what information apps have access to and avoid granting inappropriate or excessive permissions, which puts individuals and organizations at risk. IT and security teams are increasingly turning to automation and AI to ease the manual and mundane parts of device management and importantly, to create a moat around the personal data and work data accessible through our phones.”

Improving risk scoring accuracy and precision to more quickly identify identity threats

CISOs and their teams tell VentureBeat they’ve offered to help test the latest generation of AI and ML-based risk-scoring models their providers are readying for launch. Leading cybersecurity providers have already released improved risk scoring to identify and thwart identity-based attacks.

AI is proving effective in analyzing large volumes of identity and access data in real time to detect subtle patterns and anomalies that indicate compromised credentials or insider threats. Adopting a real-time telemetry approach reduces false positives.

Detecting synthetic identity fraud and deepfakes

From reducing false positives and identifying synthetic fraud to spotting deepfakes, all AI-based identity platforms and solutions share the common attributes of relying on decades of data to train models and assigning trust scores by transaction.

For instance, Telesign’s model-based approach is noteworthy in its efficiency in getting the most value from various real-time telemetry data sources. Their model relies on more than 2,200 digital attributes and creates insights based on approximately 5 billion unique phone numbers, more than 15 years of historical data patterns and supporting analytics. 

Phone number velocity, traffic patterns, fraud database consortiums and phone data attributes distinguish Telesign’s approach. Identity signals are scored for anomalies that may indicate a synthetic identity. The system “learns” from predictive analytics and supervised and unsupervised ML algorithms.

The company’s risk assessment model combines structured and unstructured ML to provide a risk assessment score in milliseconds, verifying whether a new account is legitimate.

Telesign’s unique methodology identifies potential fraud attempts by abnormal behavior and usage patterns of telephone numbers, devices, and over 2,200 variables. Source: Telesign.

Relying on resilient, self-healing endpoints

Enabling self-healing endpoints to regenerate themselves autonomously and detect and respond to potential threats are two ways AI drives greater endpoint resilience. AI also enables endpoints to quickly detect and respond to anomalies and advanced threats that rules-based systems miss.

CISOs tell VentureBeat that they use AI-based self-healing endpoints to reduce manual IT support time and cost, improve compliance and identify identity-based breach attempts where attackers try to gain access using stolen privileged credentials.  

Leading self-healing endpoint providers include Absolute, Akamai, Ivanti, Malwarebytes, Microsoft, SentinelOne, Tanium and Trend Micro. Absolute’s Resilience platform is noteworthy as it provides real-time visibility and control of any device, whether on the network or not. Their platform is factory-embedded in firmware by 28 top device manufacturers, making it the world’s only firmware-embedded endpoint visibility and control platform. Absolute is firmware embedded in more than 600 million endpoints and the company serves 21,000 global customers. 

AI is core to the future of identity security 

As a recent CrowdStrike report illustrated, identities are under siege. Remote and hybrid workers are high-value targets because attackers also want to steal their identities. 

By prioritizing AI for 360-degree endpoint monitoring, multi-layered mobile threat defense, real-time risk scoring, synthetic fraud detection and self-healing endpoints, organizations can protect employees’ identities and reduce the threat of a breach.

AI-based platforms and systems are proving effective in identifying anomalies and potential threats in real time, ultimately shutting down identity-based breaches and attempts to use synthetic identities and stolen access credentials.

VentureBeat’s mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : VentureBeat – https://venturebeat.com/security/five-ways-cisos-are-using-ai-to-protect-their-employees-digital-devices-and-identities/

Tags: CISOstechnologyusing
Previous Post

Jeremy Martin Signs Three-Year Extension with Muc-Off/FXR/ClubMX Yamaha

Next Post

Resident Evil 4 Remake, Assassin’s Creed Mirage coming to iPhone 15 Pro

AI’s race in the dark with China – Axios

The High-Stakes AI Race: Innovation and Competition in the Shadows

July 27, 2025
LeBron James’ future with Lakers beyond 2025-26 certain to generate speculation leading up to training camp – Yahoo Sports

LeBron James’ Lakers Future Beyond 2025-26 Sparks Intense Speculation Ahead of Training Camp

July 27, 2025
Energy landscapes direct the movement preferences of elephants – besjournals

Energy landscapes direct the movement preferences of elephants – besjournals

July 27, 2025
At United Nations Summer Program, Computer Science Student Examines AI Ethics – Georgetown University

At United Nations Summer Program, Computer Science Student Examines AI Ethics – Georgetown University

July 27, 2025
Return of wolves to Yellowstone has led to a surge in aspen trees unseen for 80 years – Live Science

Wolves’ Return to Yellowstone Sparks Unprecedented Aspen Tree Boom After 80 Years

July 27, 2025
‘Bluey’ Is Growing Up: BBC Plots All-Ages Expansion For The Franchise As A Full-Fledged Lifestyle Brand – Cartoon Brew

‘Bluey’ Is Growing Up: BBC Plots All-Ages Expansion For The Franchise As A Full-Fledged Lifestyle Brand – Cartoon Brew

July 27, 2025
Katie Ledecky, Summer McIntosh and a race for the ages at World Swimming Championships – NBC Sports

Katie Ledecky and Summer McIntosh Ignite an Epic Showdown at the World Swimming Championships

July 27, 2025
5 ways Trump has shaped the economy in 6 months – The Hill

5 Game-Changing Ways Trump Transformed the Economy in Just 6 Months

July 27, 2025
Flutter Entertainment Announces Pricing Of $1.272 Bln Of Additional Senior Secured Notes Due 2031 – Nasdaq

Flutter Entertainment Raises $1.27 Billion in Major Senior Secured Notes Offering Due 2031

July 27, 2025
KFF Health Tracking Poll: Public Views on Recent Tax and Budget Legislation – KFF

How the Public Really Feels About the Latest Tax and Budget Changes

July 27, 2025

Categories

Archives

July 2025
MTWTFSS
 123456
78910111213
14151617181920
21222324252627
28293031 
« Jun    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (741)
  • Economy (765)
  • Entertainment (21,645)
  • General (16,135)
  • Health (9,803)
  • Lifestyle (773)
  • News (22,149)
  • People (767)
  • Politics (774)
  • Science (15,980)
  • Sports (21,263)
  • Technology (15,747)
  • World (748)

Recent News

AI’s race in the dark with China – Axios

The High-Stakes AI Race: Innovation and Competition in the Shadows

July 27, 2025
LeBron James’ future with Lakers beyond 2025-26 certain to generate speculation leading up to training camp – Yahoo Sports

LeBron James’ Lakers Future Beyond 2025-26 Sparks Intense Speculation Ahead of Training Camp

July 27, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version