Plato Data Intelligence.
Vertical Search & Ai.

Tag: Red Team

How to Red Team GenAI: Challenges, Best Practices, and Learnings

Generative artificial intelligence (GenAI) has emerged as a significant change-maker, enabling teams to innovate faster, automate existing workflows, and rethink the way we go...

Top News

Blue Team: 6 open source tools to defend your position

Do you ever play computer games such as Halo or Gears of War? If so, you’ve definitely noticed a game mode called Capture the...

Sora AI Produces Eye-Popping Videos Instantly

Sora, an impressive new generative video model created by OpenAI, can take a brief text description and transform it into a minute-long, intricate, high-definition...

Disrupting malicious uses of AI by state-affiliated threat actors

Based on collaboration and information sharing with Microsoft, we disrupted five state-affiliated malicious actors: two China-affiliated threat actors known as Charcoal Typhoon and Salmon...

New US Government ‘Safety Consortium’ Seeks to ‘Police’ AI

The U.S. government announced a new consortium to support the development and deployment of what it calls “safe and trustworthy” generative AI as authorities...

How the SEC’s Rules on Cybersecurity Incident Disclosure Are Exploited

COMMENTARYData security continues to be a leading challenge for businesses in an always-on, always-connected world. According to data from Qualys' 2023 threat landscape year...

Why Red Teams Can’t Answer Defenders’ Most Important Questions

COMMENTARYIn 1931, scientist and philosopher Alfred Korzybski wrote, "The map is not the territory." He meant that all models, like maps, leave out some...

5 Essential Insights from the ‘Microsoft Digital Defense Report 2023’

Since 2005, Microsoft has released annual security intelligence reports, now known as the "Microsoft Digital Defense Report," as a way to track evolving cybersecurity...

Establishing Reward Criteria for Reporting Bugs in AI Products

At Google, we maintain a Vulnerability Reward Program to honor cutting-edge external contributions addressing issues in Google-owned and Alphabet-subsidiary Web properties. To keep up...

All I Really Need to Know About Cyber Security, I Learned in Kindergarten – Fintech Singapore

by Dan Wiley, Chief Security Advisor, Check Point Software December 15, 2023 I’m often asked which of...

Meta launches Purple Llama for AI developers to test safety

Meta has launched Purple Llama – a project aimed at building open source tools to help developers assess and improve trust and safety in...

Rootkit Turns Kubernetes From Orchestration to Subversion

As software development focuses on continuous integration and deployment, orchestration platforms like Kubernetes have taken off, but that popularity has put them in attackers'...

Proactive, Compliance-focused and Empowering SOCs’ Capabilities

HONG KONG, Nov 22, 2023 - (ACN Newswire) - CITIC Telecom International CPC Limited (CITIC Telecom CPC), a wholly-owned subsidiary of CITIC Telecom International...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?