01.03.2024 Views

The Cyber Defense eMagazine March Edition for 2024

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GenAI is changing security needs<br />

Online crime was already equivalent to the world’s third-largest economy during the pandemic. Now,<br />

generative AI and automation give organized criminals the means to create more realistic-looking attacks,<br />

develop new types of attacks, and automate attacks at scale, even without coding and writing skills. For<br />

example, the Association of Certified Fraud Examiners site shows how easy it is to use ChatGPT to<br />

create a realistic-looking security warning email that fraudsters could use to impersonate a business and<br />

steal account login credentials.<br />

GenAI-powered bots can also help scammers to identify high-value targets and engage with them<br />

conversationally to build trust be<strong>for</strong>e defrauding them. <strong>The</strong>se kinds of attacks–especially when they’re<br />

used to impersonate brands and ecommerce sites–have the potential to erode rising consumer<br />

confidence in ecommerce.<br />

From 2022 to 2023, according to ClearSale’s consumer attitudes survey data, the portion of U.S. and<br />

Canadian consumers who said that they had been deterred from making an online purchase because<br />

they didn’t know if the online store was legitimate dropped from 52% to 24%. That’s a testament to the<br />

work that businesses, payment processors, and fraud prevention teams have put into making ecommerce<br />

a safer experience.<br />

If AI-generated impostor sites and emails succeed in defrauding a higher percentage of online shoppers,<br />

more people will hesitate be<strong>for</strong>e doing business with companies online. That will result in less online<br />

revenue and higher customer acquisition costs, along with a decrease in ROI on existing ecommerce<br />

investments.<br />

Keep your culture open to GenAI’s defensive possibilities<br />

Organizations that want to detect and deflect GenAI-powered security threats need to leverage AI <strong>for</strong><br />

defense. Because of AI’s powerful pattern-recognition capabilities, it’s the most efficient way to identify<br />

the subtle indicators of GenAI-created messages, other media, and sites. For example, one AI-based<br />

model <strong>for</strong> detecting insurance fraud finds three times as many fake claims as legacy fraud-screening<br />

tools.<br />

Rather than dismissing GenAI because of its current flaws, cultivate support <strong>for</strong> properly supervised<br />

innovation with these emerging tools. That way, your organization is less likely to fall behind as GenAI<br />

threats and defenses advance.<br />

Public companies face new security accountability<br />

<strong>2024</strong> is the first full year that publicly traded companies in the U.S. must disclose cybersecurity incidents<br />

within four business days of determining that an incident is material. <strong>The</strong> new rule took effect in December<br />

2023 and requires that these incident disclosures “describe the material aspects of the nature, scope,<br />

and timing of the incident, as well as the material impact or reasonably likely material impact of the<br />

incident on the company, including its financial condition and results of operations.”<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2024</strong> <strong>Edition</strong> 126<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!