The previous week’s articles are featured below.
By Anthropic.com
We recently argued that an inflection point had been reached in cybersecurity: a point at which AI models had become genuinely useful for cybersecurity operations, both for good and for ill.
This was based on systematic evaluations showing cyber capabilities doubling in six months; we’d also been tracking real-world cyberattacks, observing how malicious actors were using AI capabilities. While we predicted these capabilities would continue to evolve, what has stood out to us is how quickly they have done so at scale…
Read MoreBy Kevin Townsend, Security Week
Application programming interfaces (APIs) are essential to the operation of a connected cyberworld.
“APIs have become the connective tissue of modern technology and are part of our entire digital world,” explains Chrissa Constantine, senior cybersecurity solution architect at Black Duck. “Some recent estimates show that approximately 83% of internet traffic flows through APIs, which reflects how APIs are deeply connected in our digital lives…”
Read More
By Michael Scheffler, CSO Magazine
Security officers are frequently asked about the biggest cyber risks at present. But how significant is the actual risk within the company? CISOs need to keep on top of this question.
From a certain age, many people regularly visit their doctor for check-ups. In this way, risks and dangers can be identified early and appropriate measures taken. The same applies to cybersecurity: Regular risk assessments help security teams identify vulnerabilities and areas for improvement. Unfortunately, such assessments are not carried out universally…
Read MoreBy Jeremiah Buckley, James Chou, Sherry-Maria Safchuk;
Orrick, Herrington & Sutcliffe LLP/JD Supra
Orrick’s James Chou joins RegFi co-hosts Jerry Buckley and Sherry Safchuk for a wide-ranging discussion on how cyber risk is evolving for financial services providers.
The conversation explores the growing sophistication of nation-state and criminal cyber threats, increasing regulatory expectations across federal and state regimes, and the operational realities of responding to cyber incidents and ransomware attacks. The episode also looks ahead to emerging risks associated with quantum computing and the steps financial institutions can take today to begin planning for a post-quantum environment…
Read More