Data loss prevention vendors tackle gen AI data risks
Businesses are using DLP tools to help secure generative AI and reduce risks of ChatGPT and similar applications.
Data loss prevention vendors tackle gen AI data risks Read More »
Businesses are using DLP tools to help secure generative AI and reduce risks of ChatGPT and similar applications.
Data loss prevention vendors tackle gen AI data risks Read More »
With growing adoption of zero trust, CISOs must look at all possible blind spots across the organization, be that unmonitored IoT devices or third-party systems, to ensure attackers can’t find a way in.
5 areas where zero trust can’t protect your organization Read More »
For those hoping to avoid the pay-or-not-to-pay ransomware dilemma, there are three things to focus on that can help CISOs: create incident response plans, improve cybersecurity posture, and invest in robust backups.
3 strategies that can help stop ransomware before it becomes a crisis Read More »
Growing use of APIs give attackers more ways to break authentication controls, exfiltrate data, or perform disruptive acts.
Why API attacks are increasing and how to avoid them Read More »
Rapid growth and development of AI is pushing the limits of cybersecurity and CISOs must take charge now to be ahead of a range of risks including data leak, compliance and prompt injection attacks.
How CISOs can balance the risks and benefits of AI Read More »
A recent report found that companies with cyber insurance have been hit by ransomware more than those without it, and sometimes more than once. Although threat actors may not be directly correlating the insurance factor to find targets, one of the reasons for this may be that as insurers require more from companies those able to pay for insurance are also likely to be able to afford bigger ransoms.
Insured companies more likely to be ransomware victims, sometimes more than once Read More »
Siemens us chief cybersecurity officer Helen Negre discusses how the organization is focusing on zero trust to ensure the security of internal systems across its different lines of business.
How to stay ahead of attacks by learning about the risks of AI-based search engines, what skill sets are needed to defend systems and ensuring employees can learn to use AI tools safely without inviting attackers in.
AI-fueled search gives more power to the bad guys Read More »
The Microsoft-backed free chatbot is improving fast and can not only write emails, essays but can also code. ChatGPT is also polyglot and that could facilitate and increase exponentially phishing attacks.
How AI chatbot ChatGPT changes the phishing game Read More »
The virtual representation of objects or systems through digital twins provide organizations greater insight into their assets but it can also invite malicious actors.
The cybersecurity challenges and opportunities of digital twins Read More »
Open RAN enables interoperability among hardware, software, and interfaces used in cellular networks but also changes their attack surface.
Top 5 security risks of Open RAN Read More »
Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here’s how to spot and avoid the worst of them.
6 signs your IAM strategy is failing, and how to fix it Read More »
Threat actors have several ways to fool or exploit artificial intelligence and machine learning systems and models, but you can defend against their tactics.
Adversarial machine learning explained: How attackers disrupt AI and ML systems Read More »
Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.
9 ways hackers will use machine learning to launch attacks Read More »
Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.
7 machine identity management best practices Read More »