Vulnerability management

Part 2: Social engineering, malware, and the future of cybersecurity in AI

Part 2: Social engineering, malware, and the future of cybersecurity in AI

A deep dive into the human side of cybersecurity, exploring the motivations of bad actors, the evolution of social engineering in the age of AI, and the defensive strategies being developed. The discussion covers the move beyond passwords with passkeys and risk-based authentication, and confronts the complex security and privacy challenges introduced by autonomous agents.

The AI vulnerability apocalypse, a new strain of Petya and dumb cybersecurity rules

The AI vulnerability apocalypse, a new strain of Petya and dumb cybersecurity rules

Panelists debate the likelihood of an "AI vulnerability cataclysm", discussing whether AI will overwhelm defenses or if it's an arms race where both attackers and defenders level up. The discussion covers the return of threat group Scattered Spider using AI-powered vishing, the persistent and significant risks of cloud misconfigurations, the emergence of firmware-level ransomware like HybridPetya, and the importance of focusing on security fundamentals and user education over punitive rules.