article thumbnail

Episode 245: How AI is remaking knowledge-based authentication

The Security Ledger

We talk with Matt Salisbury of Honeybadger HQ, which is using AI and machine learning to re-imagine knowledge-based authentication. The post Episode 245: How AI is remaking knowledge-based authentication appeared first on The Security. AI juices knowledge-based authentication. Read the whole entry. »

article thumbnail

Kyndi Unveils New Features to Optimize Enterprise Knowledge Bases

Information Matters

of its natural language processing engine, promising enhanced knowledge management for businesses. The update includes generative AI-powered tools for streamlining how Read more The post Kyndi Unveils New Features to Optimize Enterprise Knowledge Bases appeared first on Information Matters - Where AI Meets Knowledge Management.

IT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MITRE presents ATT&CK for ICS, a knowledge base for ICS

Security Affairs

MITRE announced the initial release of a version of its MITRE ATT&CK knowledge base that focuses on industrial control systems (ICS). Now the organization is going to propose a knowledge base that focused on ICS systems for its MITRE’s ATT&CK. ” reads the official page set up by MITRE.

article thumbnail

NIST Recommends Some Common-Sense Password Rules

Schneier on Security

Verifiers and CSPs SHALL NOT prompt subscribers to use knowledge-based authentication (KBA) (e.g., “What was the name of your first pet?”) Verifiers and CSPs SHALL NOT permit the subscriber to store a hint that is accessible to an unauthenticated claimant. ”) or security questions when choosing passwords.

Passwords 114
article thumbnail

'DarkBERT' GPT-Based Malware Trains Up on the Entire Dark Web

Dark Reading

The DarkBART and DarkBERT cybercriminal chatbots, based on Google Bard, represent a major leap ahead for adversarial AI, including Google Lens integration for images and instant access to the whole of the cyber-underground knowledge base.

Access 95
article thumbnail

GAO: After Equifax Breach, KBA No Longer Effective

Data Breach Today

New Report Calls for Other Methods of Authentication at Federal Agencies Some federal agencies inappropriately continue to rely on knowledge-based authentication to prevent fraud and abuse even though this method is no longer trustworthy because so much personal information that's been breached is readily available to fraudsters, a new U.S.

article thumbnail

MITRE Releases 'Shield' Active Defense Framework

Dark Reading

Free knowledge base offers techniques and tactics for engaging with and better defending against network intruders.

120
120