#ai-in-security

[ follow ]
fromThe Hacker News
4 days ago

The State of AI in the SOC 2025 - Insights from Recent Study

A comprehensive survey of 282 security leaders at companies across industries reveals a stark reality facing modern Security Operations Centers: alert volumes have reached unsustainable levels, forcing teams to leave critical threats uninvestigated. You can download the full report here. The research, conducted primarily among US-based organizations, shows that AI adoption in security operations has shifted from experimental to essential as teams struggle to keep pace with an ever-growing stream of security alerts.
Information security
Privacy technologies
fromTechzine Global
1 month ago

Google's AI Big Sleep discovers twenty new security vulnerabilities in open source

AI-powered vulnerability detector Big Sleep identified twenty new vulnerabilities in open-source software, leveraging collaboration between Google DeepMind and Project Zero.
fromThe Hacker News
3 months ago

The Hidden Weaknesses in AI SOC Tools that No One Talks About

Pre-trained AI models in the SOC are typically developed by training machine learning algorithms on historical data from specific security use cases, such as phishing detection, endpoint malware alerts, and the like.
Privacy technologies
#cybersecurity
fromDevOps.com
3 months ago

Seraphic Security Unveils BrowserTotal - Free AI-Powered Browser Security Assessment for Enterprises - DevOps.com

"Web browsers have become one of the enterprise's most exploited attack surfaces," said Ilan Yeshua, CEO and co-founder of Seraphic Security. "With Browser Total, we're giving security leaders a powerful, transparent way to visualize their organization's browser's security risks..."
Privacy technologies
Information security
fromSecuritymagazine
3 months ago

71% of Organizations Cannot Cover the Cloud Environment With Current Tools

Complex cloud environments challenge organizations' cloud security management.
Despite high confidence in security, significant concerns about unauthorized services and tool coverage exist.
fromThe Hacker News
5 months ago

How to Automate CVE and Vulnerability Advisory Response with Tines

Before automation, creating tickets for 45 vulnerabilities took about 150 minutes of work. After automation, the time needed for the same number of tickets dropped to around 60 minutes.
DevOps
Privacy professionals
fromTechzine Global
5 months ago

Humans aren't the weakest link, they're a critical security layer

Shift focus from security awareness to Human Risk.
Human behavior must be accounted for in security strategies.
AI is changing the landscape of security threats and human risk.
[ Load more ]