Intelligent Build.tech Issue 16 | Page 11

CrowdStrike aims to secure the future of Generative AI innovation with NVIDIA

C rowdStrike has announced it is providing additional safeguards for NVIDIA NIM Agent Blueprints with the AI-native CrowdStrike Falcon cybersecurity platform to help developers securely leverage open-source foundational models and accelerate Generative AI innovation .

Building enterprise Generative AI applications is a complex , multistep process . Enterprises need blueprints for standard Generative AI workflows – including customer service chatbots , retrievalaugmented generation and drug discovery – to streamline the development process . The security of these models and underlying data is critical to ensuring the performance and integrity of Generative AI applications .
NVIDIA NIM Agent Blueprints are reference applications that leverage NVIDIA NIM microservices and the
NVIDIA NeMo platform , all part of the NVIDIA AI Enterprise software stack . By adding support for NIM Agent Blueprints , CrowdStrike is enabling enterprises to develop customised Generative AI applications securely and efficiently , using the latest open-source foundational models available with NVIDIA NIM .
“ CrowdStrike pioneered AI-native cybersecurity and is at the epicenter of securing the AI systems that are driving the Generative AI revolution ,” said Daniel Bernard , Chief Business Officer , CrowdStrike . “ We continue to innovate alongside NVIDIA , providing enterprises with the essential tools

NEWS

they need to supercharge generative AI development , utility and security .”
“ Security is fundamental to creating enterprise-grade Generative AI applications ,” said Justin Boitano , Vice President of Enterprise AI Software Products , NVIDIA . “ With NVIDIA NIM Agent Blueprints supported on CrowdStrike , companies can build applications for core Generative AI use cases that align with business security requirements .”

Searchlight Cyber Report reveals rapid changes in ransomware landscape over six months

ransomware report 2024 at the start of the year . The report offers key insights drawn from Dark Web intelligence to help organisations bolster their defences against emerging threats .
The report shows how – in just six months of the year – one of the biggest ransomware groups ( BlackCat ) ceased operations , a new gang ( RansomHub ) emerged in February and quickly established itself as the third most prolific ransomware group , and outlines the effects of devastating attacks executed against organisations .
The report also profiles new entrants in 2024 including APT73 and DarkVault , potential offshoots of the disrupted LockBit , who are expected to become significant threats in the near future . Quilong , a closed ransomware group that emerged in April 2024 , also had a significant impact in the first half of the year , targeting healthcare organisations in Brazil .

S earchlight Cyber , the Dark Web intelligence company , has released its latest report , revealing key ransomware trends for the first half of 2024 .

Ransomware in H1 2024 : Trends from the Dark Web showcases how the ransomware scene has shifted since the release of its annual
Luke Donovan , Head of Threat Intelligence at Searchlight Cyber , said : “ As we ’ ve seen in the first half of 2024 , the ransomware landscape is not just expanding , it ’ s fragmenting . With over 70 active ransomware groups now in operation , the ransomware landscape is becoming more complex for cybersecurity professionals to navigate .”
www . intelligentbuild . tech 11