Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: generative AI

  1. Home
  2. generative AI

New AI Security Tool Helps Organizations Set Trust Zones for Gen-AI Models

Measure the different level of risk inherent to all gen-AI foundational models and use that to fine-tune the operation of in-house AI deployments.

The post New AI Security Tool Helps Organizations Set Trust Zones for Gen-AI Models appeared first on SecurityWeek.

New CCA Jailbreak Method Works Against Most AI Models

Two Microsoft researchers have devised a new jailbreak method that bypasses the safety mechanisms of most AI systems.

The post New CCA Jailbreak Method Works Against Most AI Models appeared first on SecurityWeek.

AIceberg Gets $10 Million in Seed Funding for AI Security Platform

AIceberg has launched a solution that helps governments and enterprises with the safe, secure and compliant adoption of AI. 

The post AIceberg Gets $10 Million in Seed Funding for AI Security Platform appeared first on SecurityWeek.

Microsoft Names Suspects in Lawsuit Against AI Hackers

In a lawsuit targeting cybercriminals who abuse AI services, Microsoft has named individuals from Iran, the UK, China and Vietnam.

The post Microsoft Names Suspects in Lawsuit Against AI Hackers appeared first on SecurityWeek.

Microsoft Unveils Copilot Vision AI Tool, but Highlights Security After Recall Debacle

Microsoft has unveiled a new AI-based web content analysis tool, underscoring safety and security to address potential concerns. 

The post Microsoft Unveils Copilot Vision AI Tool, but Highlights Security After Recall Debacle appeared first on SecurityWeek.

Can AI be Meaningfully Regulated, or is Regulation a Deceitful Fudge?

Few people understand AI, nor how to use nor control it, nor where it is going. Yet politicians wish to regulate it.

The post Can AI be Meaningfully Regulated, or is Regulation a Deceitful Fudge? appeared first on SecurityWeek.

US Disrupts AI-Powered Russian Bot Farm on X

The US and allies blame Russian state-sponsored threat actors for using Meliorator AI software to create a social media bot farm.

The post US Disrupts AI-Powered Russian Bot Farm on X appeared first on SecurityWeek.

Microsoft Details ‘Skeleton Key’ AI Jailbreak Technique

Microsoft has tricked several gen-AI models into providing forbidden information using a jailbreak technique named Skeleton Key.

The post Microsoft Details ‘Skeleton Key’ AI Jailbreak Technique appeared first on SecurityWeek.

Mozilla Launches 0Din Gen-AI Bug Bounty Program

Mozilla has announced a 0Day Investigative Network (0Din) bug bounty program for LLMs and other deep learning tech.

The post Mozilla Launches 0Din Gen-AI Bug Bounty Program appeared first on SecurityWeek.

Averlon Emerges From Stealth Mode With $8 Million in Funding

Averson secures seed funding to build technology that uses AI to identify cloud security weaknesses and counter cyberattacks.

The post Averlon Emerges From Stealth Mode With $8 Million in Funding appeared first on SecurityWeek.

  • 1
  • 2
  • 3
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it