* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Wednesday, July 2, 2025
Earth-News
  • Home
  • Business
  • Entertainment
    Nantucket Dance Festival opens July 8 – The Inquirer and Mirror

    Nantucket Dance Festival Launches with Thrilling Performances Beginning July 8

    A Secret Society, Ritualistic Killings, and a Century-Old Curse Netflix and YRF Entertainment’s ‘Mandala Murders’ Premieres July 25 – About Netflix

    A Secret Society, Ritualistic Killings, and a Century-Old Curse: Dive into the Chilling World of ‘Mandala Murders’ Premiering July 25

    Susquehanna Raises Penn Entertainment Inc. (PENN) Price Target. – Yahoo Finance

    Susquehanna Raises Price Target for Penn Entertainment Inc. (PENN)

    George Lopez is coming to Spokane – KXLY.com

    George Lopez is coming to Spokane – KXLY.com

    Netflix unveils Dallas immersive venue for fans of hit shows like ‘Squid Game,’ ‘Stranger Things’ – Houston Chronicle

    Step Inside Netflix’s New Dallas Immersive Experience Featuring Hits Like ‘Squid Game’ and ‘Stranger Things

    ‘Puttin’ on the Ritz’: Civic Players bring ‘Young Frankenstein’ to life – Yahoo

    Civic Players Deliver a Hilarious and Unforgettable Performance of ‘Young Frankenstein

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Meiwu Technology Company Limited and Shenzhen Zhinuo – GlobeNewswire

    Meiwu Technology Company Limited and Shenzhen Zhinuo – GlobeNewswire

    Owls inspire new revolutionary noise reduction technology – KTEN

    Owls inspire new revolutionary noise reduction technology – KTEN

    New center coming to Mizzou will focus on energy research and technology – Columbia Missourian

    Mizzou Launches Innovative New Center Dedicated to Energy Research and Technology

    Mirrors in space and underwater curtains: can technology buy us enough time to save the Arctic ice caps? – The Guardian

    Can Technology Like Space Mirrors and Underwater Curtains Buy Us Time to Save the Arctic Ice Caps?

    Naples restaurant owner prepares for hurricane season with new flood technology – Fox4Now.com

    Naples restaurant owner prepares for hurricane season with new flood technology – Fox4Now.com

    Emerging Memory and Storage Technology Market Analysis Report 2025-2034 | AI and HPC Boom Fuels Surging Demand for Fast, Low-Power Memory Devices – Yahoo Finance

    How AI and HPC Are Driving Explosive Growth in Fast, Low-Power Memory Technologies Through 2034

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment
    Nantucket Dance Festival opens July 8 – The Inquirer and Mirror

    Nantucket Dance Festival Launches with Thrilling Performances Beginning July 8

    A Secret Society, Ritualistic Killings, and a Century-Old Curse Netflix and YRF Entertainment’s ‘Mandala Murders’ Premieres July 25 – About Netflix

    A Secret Society, Ritualistic Killings, and a Century-Old Curse: Dive into the Chilling World of ‘Mandala Murders’ Premiering July 25

    Susquehanna Raises Penn Entertainment Inc. (PENN) Price Target. – Yahoo Finance

    Susquehanna Raises Price Target for Penn Entertainment Inc. (PENN)

    George Lopez is coming to Spokane – KXLY.com

    George Lopez is coming to Spokane – KXLY.com

    Netflix unveils Dallas immersive venue for fans of hit shows like ‘Squid Game,’ ‘Stranger Things’ – Houston Chronicle

    Step Inside Netflix’s New Dallas Immersive Experience Featuring Hits Like ‘Squid Game’ and ‘Stranger Things

    ‘Puttin’ on the Ritz’: Civic Players bring ‘Young Frankenstein’ to life – Yahoo

    Civic Players Deliver a Hilarious and Unforgettable Performance of ‘Young Frankenstein

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Meiwu Technology Company Limited and Shenzhen Zhinuo – GlobeNewswire

    Meiwu Technology Company Limited and Shenzhen Zhinuo – GlobeNewswire

    Owls inspire new revolutionary noise reduction technology – KTEN

    Owls inspire new revolutionary noise reduction technology – KTEN

    New center coming to Mizzou will focus on energy research and technology – Columbia Missourian

    Mizzou Launches Innovative New Center Dedicated to Energy Research and Technology

    Mirrors in space and underwater curtains: can technology buy us enough time to save the Arctic ice caps? – The Guardian

    Can Technology Like Space Mirrors and Underwater Curtains Buy Us Time to Save the Arctic Ice Caps?

    Naples restaurant owner prepares for hurricane season with new flood technology – Fox4Now.com

    Naples restaurant owner prepares for hurricane season with new flood technology – Fox4Now.com

    Emerging Memory and Storage Technology Market Analysis Report 2025-2034 | AI and HPC Boom Fuels Surging Demand for Fast, Low-Power Memory Devices – Yahoo Finance

    How AI and HPC Are Driving Explosive Growth in Fast, Low-Power Memory Technologies Through 2034

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Technology

Five ways CISOs are using AI to protect their employees’ digital devices and identities

September 13, 2023
in Technology
Five ways CISOs are using AI to protect their employees’ digital devices and identities
Share on FacebookShare on Twitter

September 12, 2023 12:59 PM

Image Credit: albund/Shutterstock

Head over to our on-demand library to view sessions from VB Transform 2023. Register Here

Using generative AI to automate scripts seeking unprotected endpoints, ports and infrastructure security gaps, cybercrime gangs offer bounties for targeted organizations’ employee digital device passwords and identities. As many recent attacks show, putting any trust in identities is a breach waiting to happen. 

Notably, digital and physical crime in healthcare has long been converging and growing into a pandemic. Healthcare providers warn their employees not to leave their laptops in their cars unattended. The Coplin Health incident in which 43,000 records containing personal health information (PHI) were compromised after an employee’s laptop was stolen from their car is still a concern boards mention regarding identity security. A stolen laptop with unencrypted PHI data can often lead to a $1 million settlement based on HIPAA violations alone. 

Attacks on employees’ digital devices and identities are soaring

Healthcare CISOs tell VentureBeat that attempts to steal employees’ digital devices are soaring because PHI records command the highest prices on the dark web and are untraceable. The U.S. Department of Health and Human Services (HHS) Breach Portal shows that in the last eighteen months alone, 799 healthcare providers have been breached, 551 of them experiencing a server-based attack and 173 email-based in which laptops were used to gain access. 

CrowdStrike’s cofounder and CEO George Kurtz said in his keynote at last year’s Fal.Con that “80% of the attacks or the compromises that we see use some form of identity and credential theft.”

Event

VB Transform 2023 On-Demand

Did you miss a session from VB Transform 2023? Register to access the on-demand library for all of our featured sessions.

Register Now

The Identity Defined Security Alliance (IDSA)’s 2023 Trends in Securing Digital Identities report found that 90% of organizations experienced at least one identity-related breach in the past year, representing a 7.1% increase year-over-year.

Getting ready for automated attacks that weaponize AI at scale

Deepfake attacks are so pervasive that the Department of Homeland Security provides the guide Increasing Threats of Deepfake Identities, which outlines how to counter them. VentureBeat has learned of several attempted deepfake attacks on leading enterprise software CEOs that follow the same attack pattern in which Zscaler CEO Jay Chaudhyr’s voice was used to extort funds from the company’s India-based operations.

Chaudhry, Kurtz and CEOs of top cybersecurity companies agree that stolen identities and privileged access credentials are customers’ biggest threats. The Finnish Transport and Communications Agency National Cyber Security Centre and WithSecure commissioned a study to predict AI-enabled cyberattacks, as shown below.

Generative AI improves social engineering and credential theft skills, creating weaponized AI that can launch automated, resilient identity attacks. Source: Finnish Transport and Communications Agency.

How CISOs are using AI to protect employees’ identities 

Security teams and the CISOs leading them can’t afford to lose the AI war. The following five AI and machine learning (ML) techniques have become table stakes for stopping identity-based attacks:

Getting a more precise count, location and telemetry of all endpoints, machines and associated identities

Cybersecurity and IT teams often can’t locate 35% to 40% of their endpoints and machines. With the proliferation of new identities assigned to endpoints and the resulting unchecked agent sprawl, attackers’ reconnaissance efforts quickly find over configured endpoints.  

Endpoint sprawl makes identity breaches harder to stop. Six in 10 (59%) endpoints have at least one identity and access management (IAM) agent, and 11% have two or more. These and other findings from Absolute Software’s 2023 Resilience Index illustrate the false sense of security organizations have in security tools.

The Index found that many endpoint controls aren’t installed correctly, leaving 25 to 30% of devices vulnerable to attack. Treating every identity as a new security perimeter, enforcing least privileged access, monitoring every transaction and going all in on zero trust for every endpoint must be a priority.

Moving beyond mobile device VPNs and standardizing AI-enabled Mobile Threat Defense (MTD)

In a recent interview with VentureBeat, Ivanti chief product officer Srinivas Mukkamala noted that, “increasingly, our cell phones contain our whole lives. At the heart of modern device management organizations [protecting] data everywhere work happens, especially work that is happening on personal devices.” 

Mukkamala’s comments reflect what VentureBeat hears from CISOs in healthcare, manufacturing and financial services, in which mobile devices are frequently an attack target.

Mukkamala advised that “there is a continued need to more easily control what information apps have access to and avoid granting inappropriate or excessive permissions, which puts individuals and organizations at risk. IT and security teams are increasingly turning to automation and AI to ease the manual and mundane parts of device management and importantly, to create a moat around the personal data and work data accessible through our phones.”

Improving risk scoring accuracy and precision to more quickly identify identity threats

CISOs and their teams tell VentureBeat they’ve offered to help test the latest generation of AI and ML-based risk-scoring models their providers are readying for launch. Leading cybersecurity providers have already released improved risk scoring to identify and thwart identity-based attacks.

AI is proving effective in analyzing large volumes of identity and access data in real time to detect subtle patterns and anomalies that indicate compromised credentials or insider threats. Adopting a real-time telemetry approach reduces false positives.

Detecting synthetic identity fraud and deepfakes

From reducing false positives and identifying synthetic fraud to spotting deepfakes, all AI-based identity platforms and solutions share the common attributes of relying on decades of data to train models and assigning trust scores by transaction.

For instance, Telesign’s model-based approach is noteworthy in its efficiency in getting the most value from various real-time telemetry data sources. Their model relies on more than 2,200 digital attributes and creates insights based on approximately 5 billion unique phone numbers, more than 15 years of historical data patterns and supporting analytics. 

Phone number velocity, traffic patterns, fraud database consortiums and phone data attributes distinguish Telesign’s approach. Identity signals are scored for anomalies that may indicate a synthetic identity. The system “learns” from predictive analytics and supervised and unsupervised ML algorithms.

The company’s risk assessment model combines structured and unstructured ML to provide a risk assessment score in milliseconds, verifying whether a new account is legitimate.

Telesign’s unique methodology identifies potential fraud attempts by abnormal behavior and usage patterns of telephone numbers, devices, and over 2,200 variables. Source: Telesign.

Relying on resilient, self-healing endpoints

Enabling self-healing endpoints to regenerate themselves autonomously and detect and respond to potential threats are two ways AI drives greater endpoint resilience. AI also enables endpoints to quickly detect and respond to anomalies and advanced threats that rules-based systems miss.

CISOs tell VentureBeat that they use AI-based self-healing endpoints to reduce manual IT support time and cost, improve compliance and identify identity-based breach attempts where attackers try to gain access using stolen privileged credentials.  

Leading self-healing endpoint providers include Absolute, Akamai, Ivanti, Malwarebytes, Microsoft, SentinelOne, Tanium and Trend Micro. Absolute’s Resilience platform is noteworthy as it provides real-time visibility and control of any device, whether on the network or not. Their platform is factory-embedded in firmware by 28 top device manufacturers, making it the world’s only firmware-embedded endpoint visibility and control platform. Absolute is firmware embedded in more than 600 million endpoints and the company serves 21,000 global customers. 

AI is core to the future of identity security 

As a recent CrowdStrike report illustrated, identities are under siege. Remote and hybrid workers are high-value targets because attackers also want to steal their identities. 

By prioritizing AI for 360-degree endpoint monitoring, multi-layered mobile threat defense, real-time risk scoring, synthetic fraud detection and self-healing endpoints, organizations can protect employees’ identities and reduce the threat of a breach.

AI-based platforms and systems are proving effective in identifying anomalies and potential threats in real time, ultimately shutting down identity-based breaches and attempts to use synthetic identities and stolen access credentials.

VentureBeat’s mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : VentureBeat – https://venturebeat.com/security/five-ways-cisos-are-using-ai-to-protect-their-employees-digital-devices-and-identities/

Tags: CISOstechnologyusing
Previous Post

Jeremy Martin Signs Three-Year Extension with Muc-Off/FXR/ClubMX Yamaha

Next Post

Resident Evil 4 Remake, Assassin’s Creed Mirage coming to iPhone 15 Pro

Late Paleolithic whale bone tools reveal human and whale ecology in the Bay of Biscay – Nature

Ancient Whale Bone Tools Reveal Secrets of Human and Whale Life in the Bay of Biscay

July 2, 2025
Exploring three theories of consciousness. – Psychology Today

Unveiling the Mysteries: Exploring Three Fascinating Theories of Consciousness

July 2, 2025
MIT student wins first-ever Stephen Hawking Junior Medal for Science Communication – MIT News

MIT student wins first-ever Stephen Hawking Junior Medal for Science Communication – MIT News

July 2, 2025
Here’s what your morning routine really says about you – New York Post

What Your Morning Routine Says About Who You Really Are

July 2, 2025
David Muir, Diane Sawyer, Charlie Gibson honor ‘World News Tonight’ stage manager – MSN

David Muir, Diane Sawyer, Charlie Gibson honor ‘World News Tonight’ stage manager – MSN

July 2, 2025
Amid Russian economy warnings, Lavrov says NATO’s increased defense spending will lead to ‘collapse’ of alliance – The Kyiv Independent

Lavrov Warns Soaring NATO Defense Budgets May Spark Alliance Collapse

July 2, 2025
Column: The new book ‘Sick and Dirty’ examines the not-so-hidden queerness of classic Hollywood – Yahoo

Uncovering the Bold Queerness of Classic Hollywood in the New Book ‘Sick and Dirty

July 2, 2025

In Good Health: Vaccines, Menopause, And Cardiovascular Disease : 1A – NPR

July 2, 2025
Bush and Obama fault Trump’s gutting of USAID on agency’s last day – CNN

Bush and Obama fault Trump’s gutting of USAID on agency’s last day – CNN

July 2, 2025
Meiwu Technology Company Limited and Shenzhen Zhinuo – GlobeNewswire

Meiwu Technology Company Limited and Shenzhen Zhinuo – GlobeNewswire

July 2, 2025

Categories

Archives

July 2025
MTWTFSS
 123456
78910111213
14151617181920
21222324252627
28293031 
« Jun    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (702)
  • Economy (727)
  • Entertainment (21,615)
  • General (15,668)
  • Health (9,766)
  • Lifestyle (732)
  • News (22,149)
  • People (728)
  • Politics (734)
  • Science (15,945)
  • Sports (21,224)
  • Technology (15,711)
  • World (708)

Recent News

Late Paleolithic whale bone tools reveal human and whale ecology in the Bay of Biscay – Nature

Ancient Whale Bone Tools Reveal Secrets of Human and Whale Life in the Bay of Biscay

July 2, 2025
Exploring three theories of consciousness. – Psychology Today

Unveiling the Mysteries: Exploring Three Fascinating Theories of Consciousness

July 2, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version