Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: artificial inteligence

  1. Home
  2. artificial inteligence

OpenAI to Help DoD With Cyber Defense Under New $200 Million Contract

OpenAI has been awarded a $200 million contract for AI capabilities to help the Defense Department address national security challenges.

The post OpenAI to Help DoD With Cyber Defense Under New $200 Million Contract appeared first on SecurityWeek.

Orca Snaps Up Opus in Cloud Security Automation Push

Orca positioned the deal as an expansion of its capabilities into the realm of AI-based autonomous remediation and prevention. 

The post Orca Snaps Up Opus in Cloud Security Automation Push appeared first on SecurityWeek.

Applying the OODA Loop to Solve the Shadow AI Problem

By taking immediate actions, organizations can ensure that shadow AI is prevented and used constructively where possible.

The post Applying the OODA Loop to Solve the Shadow AI Problem appeared first on SecurityWeek.

RSA Conference 2025 – Pre-Event Announcements Summary (Part 1) 

Hundreds of companies are showcasing their products and services at the 2025 edition of the RSA Conference in San Francisco.

The post RSA Conference 2025 – Pre-Event Announcements Summary (Part 1)  appeared first on SecurityWeek.

AI-Powered Polymorphic Phishing Is Changing the Threat Landscape

Combined with AI, polymorphic phishing emails have become highly sophisticated, creating more personalized and evasive messages that result in higher attack success rates.

The post AI-Powered Polymorphic Phishing Is Changing the Threat Landscape appeared first on SecurityWeek.

DataKrypto Launches Homomorphic Encryption Framework to Secure Enterprise AI Models

DataKrypto’s FHEnom for AI combines real-time homomorphic encryption with trusted execution environments to protect enterprise data and models from leakage, exposure, and tampering.

The post DataKrypto Launches Homomorphic Encryption Framework to Secure Enterprise AI Models appeared first on SecurityWeek.

AI Can Supercharge Productivity, But We Still Need a Human-in-the-Loop

AI systems can sometimes struggle with complex or nuanced situations, so human intervention can help identify and address potential issues that algorithms might not.

The post AI Can Supercharge Productivity, But We Still Need a Human-in-the-Loop appeared first on SecurityWeek.

How Hackers Manipulate Agentic AI With Prompt Engineering

Organizations adopting the transformative nature of agentic AI are urged to take heed of prompt engineering tactics being practiced by threat actors.

The post How Hackers Manipulate Agentic AI With Prompt Engineering appeared first on SecurityWeek.

How Agentic AI will be Weaponized for Social Engineering Attacks

With each passing year, social engineering attacks are becoming bigger and bolder thanks to rapid advancements in artificial intelligence.

The post How Agentic AI will be Weaponized for Social Engineering Attacks appeared first on SecurityWeek.

Unprotected DeepSeek Database Exposed Chats, Other Sensitive Information

An unprotected database belonging to Chinese AI company DeepSeek exposed highly sensitive information, including chat history, secret keys, and backend data.

The post Unprotected DeepSeek Database Exposed Chats, Other Sensitive Information appeared first on SecurityWeek.

  • 1
  • 2
  • 3
  • ...
  • 5
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it