Latest Cybersecurity Articles

AI governance and cybersecurity certifications: Are they worth it?

AI governance and cybersecurity certifications: Are they worth it?

May 6, 2024

The International Association of Privacy Professionals (IAPP), SANS Institute, and other organizations are releasing new AI certifications in the areas of governance and cybersecurity or…

The state of ransomware: Faster, smarter, and meaner

The state of ransomware: Faster, smarter, and meaner

Mar 25, 2024

Ransomware payments hit $1.1 billion in 2023, a record high and twice what they were in 2022. The frequency, scope and volume of attacks were…

Generative AI poised to make substantial impact on DevSecOps

Generative AI poised to make substantial impact on DevSecOps

Mar 11, 2024

Generative AI is expected to help write secure code, improve code analysis, create tests, write documentation, and assist with many other DevSecOps functions. But the…

How GenAI helps entry-level SOC analysts improve their skills

How GenAI helps entry-level SOC analysts improve their skills

Mar 5, 2024

Security operations centers (SOCs) are using generative AI systems to automate repetitive triage and documentation tasks, allowing entry-level security analysts to spend more time on…

Assessing and quantifying AI risk: A challenge for enterprises

Assessing and quantifying AI risk: A challenge for enterprises

Jan 30, 2024

Artificial intelligence can help businesses through automation or by improving existing tasks, but like any technology it comes with risks if not managed well. For…

3 ways to fix old, unsafe code that lingers from open-source and legacy programs

3 ways to fix old, unsafe code that lingers from open-source and legacy programs

Nov 29, 2023

Companies that find themselves with old, vulnerable code in their environment are likely to be short of resources to fix them. Most organizations will find…

Data loss prevention vendors tackle gen AI data risks

Data loss prevention vendors tackle gen AI data risks

Oct 31, 2023

Data loss prevention (DLP) vendors are racing to add support for generative AI use cases to their platforms, following the popularity and increasing adoption of…

5 areas where zero trust can’t protect your organization

5 areas where zero trust can’t protect your organization

Sep 11, 2023

Adopting zero trust is no fail-safe against cyberattacks. Attackers are constantly finding new ways to get around zero trust, and this often happens because not…

VMware Cloud gains faster ransomware recovery, expanded management capabilities

VMware Cloud gains faster ransomware recovery, expanded management capabilities

Aug 22, 2023

VMware announced a raft of improvements to its VMware Cloud platform at this week’s VMware Explore conference in Las Vegas. Previously, VMware’s on-premises private cloud…

VMware NSX+ centralizes cloud networking and security for multicloud environments

VMware NSX+ centralizes cloud networking and security for multicloud environments

Aug 22, 2023

VMware customers that have both on-prem and cloud-based architecture can now manage networking and security for both in a single management console. Unveiled at this…

VMware combines SASE and edge management in new orchestration platform, announces private 5G service

VMware combines SASE and edge management in new orchestration platform, announces private 5G service

Aug 22, 2023

Combining things to make them easier to manage and secure is a recurring theme at this week’s VMware Explore conference in Las Vegas. To that end, VMware…

3 strategies that can help stop ransomware before it becomes a crisis

3 strategies that can help stop ransomware before it becomes a crisis

Aug 16, 2023

Over the past decade, the average value of ransoms demanded by hackers has gone from hundreds of dollars to hundreds of thousands — even into…

Hybrid mesh firewall platforms gain interest as management challenges intensify

Hybrid mesh firewall platforms gain interest as management challenges intensify

Aug 15, 2023

As enterprise networks get more complex, so do the firewall deployments. There are on-premises firewalls to manage, along with firewalls that are deployed in virtual…

Why API attacks are increasing and how to avoid them

Why API attacks are increasing and how to avoid them

Jul 25, 2023

Australian energy company Jemena has been using APIs, in some form, for about a decade. Its use of APIs — application programming interfaces — has…

Gartner: SSE landscape shifts as vendors add more security services

Gartner: SSE landscape shifts as vendors add more security services

Jul 12, 2023

The market for managed security services is shifting as enterprises weigh their requirements for cloud-based security capabilities and vendors refine their feature sets and product…

How CISOs can balance the risks and benefits of AI

How CISOs can balance the risks and benefits of AI

Jun 27, 2023

The rapid pace of change in AI makes it difficult to weigh the technology’s risks and benefits and CISOs should not wait to take charge…

Cybersecurity in a Post-Quantum World

Cybersecurity in a Post-Quantum World

Jun 7, 2023

Experts agree that future quantum computers will break most current encryption when they become sufficiently powerful. The code to do this – Shor’s algorithm –…

5G network slices could be vulnerable to attack, researchers say

5G network slices could be vulnerable to attack, researchers say

May 22, 2023

5G promises increased speed, lower latency, and support for a significantly larger number of connected devices. But the growth in devices and in new applications…

Insured companies more likely to be ransomware victims, sometimes more than once

Insured companies more likely to be ransomware victims, sometimes more than once

May 15, 2023

Companies with cyber insurance are more likely to get hit by ransomware, more likely to be attacked multiple times, and more likely to pay ransoms,…

Siemens focuses on zero trust, legacy hardware, supply chain challenges to ensure cybersecurity of internal systems

Siemens focuses on zero trust, legacy hardware, supply chain challenges to ensure cybersecurity of internal systems

Apr 25, 2023

Siemens has been working to be on top of vulnerabilities found in its products, but more importantly, to ensure the security of its internal operations.…

Secure Cloud Environments on a Budget: Focus on the Essentials

Secure Cloud Environments on a Budget: Focus on the Essentials

Apr 5, 2023

As tech companies continue to lay off employees and cut budgets, data center managers will have to figure out how to get the most bang…

AI-fueled search gives more power to the bad guys

AI-fueled search gives more power to the bad guys

Mar 29, 2023

Concerns about the reach of ChatGPT and how easier it may get for bad actors to find sensitive information have increased following Microsoft’s announcement of…

How ChatGPT Can Help and Hinder Data Center Cybersecurity

How ChatGPT Can Help and Hinder Data Center Cybersecurity

Mar 20, 2023

The world changed on Nov. 30, when OpenAI released ChatGPT to an unsuspecting public. Universities scrambled to figure out how to give take-home essays if…

Enterprises turn to single-vendor SASE for ease of manageability

Enterprises turn to single-vendor SASE for ease of manageability

Feb 2, 2023

Before the start of the Covid epidemic, a traditional WAN architecture with centralized security worked well for Village Roadshow. “Advanced security inspection services can be…

NTT, Palo Alto partner for managed SASE with AIOps

NTT, Palo Alto partner for managed SASE with AIOps

Feb 2, 2023

A new offering from IT services provider NTT combines Palo Alto Networks’ Prisma SASE offering with NTT’s managed network services and AIOps infrastructure. SASE – secure…

Pros and cons of managed SASE

Pros and cons of managed SASE

Jan 20, 2023

AmerCareRoyal, which provides disposable products for the food service and hospitality industries, is the product of six mergers and acquisitions over the past several years,…

How AI chatbot ChatGPT changes the phishing game

How AI chatbot ChatGPT changes the phishing game

Jan 17, 2023

ChatGPT, OpenAI’s free chatbot based on GPT-3.5, was released on 30 November 2022 and racked up a million users in five days. It is capable of…

The cybersecurity challenges and opportunities of digital twins

The cybersecurity challenges and opportunities of digital twins

Dec 6, 2022

Digital twins are a digital representation of objects, structures or systems that give organizations greater insight into the life cycle of these objects, but this…

Cyberattacks Are Bypassing Multi-Factor Authentication

Cyberattacks Are Bypassing Multi-Factor Authentication

Oct 28, 2022

There has been a recent surge in cyber attacks which dodge past multi-factor authentication (MFA) security measures, putting data center systems at risk. The challenge…

How to Secure Digital Twin Technology in Your Data Center

How to Secure Digital Twin Technology in Your Data Center

Oct 27, 2022

A compelling use case in the data center industry for digital twins is the inspection and maintenance of high-risk electrical equipment. But a digital twin also multiplies any underlying security…