BECs double in 2022, overtaking ransomware

A look at 4th quarter 2022, data suggests that new threat surfaces notwithstanding, low-code cybersecurity business email compromises including phishing, as well as MFA bombing are still the prevalent exploits favored by threat actors.
The post BECs do… Continue reading BECs double in 2022, overtaking ransomware

Salesforce Tableau puts AI in driver’s seat for big data

Enhancements to Tableau for Slack focuses on sharing, search and insights with automated workflows for tools like Accelerator. The goal: empower decision makers and CRM teams to put big data to work.
The post Salesforce Tableau puts AI in driver’s seat… Continue reading Salesforce Tableau puts AI in driver’s seat for big data

The Biden administration may eye CSPs to improve security, but the real caveat emptor? Secure thyself

While the administration may look to strengthen security against cyberattackers for cloud providers, like Amazon, Microsoft and Google, experts say the onus is on the customer.
The post The Biden administration may eye CSPs to improve security, but the… Continue reading The Biden administration may eye CSPs to improve security, but the real caveat emptor? Secure thyself

For credentials, these are the new Seven Commandments for zero trust

With backing from major firms, credential security company Beyond Identity has launched the Zero Trust Authentication initiative for organizations to hack-proof user credentials.
The post For credentials, these are the new Seven Commandments for zero t… Continue reading For credentials, these are the new Seven Commandments for zero trust

Kubernetes is the key to cloud, but cost containment is critical

What’s driving the growth of open source container orchestrator Kubernetes? A study by Pepperdata shows how companies are using K8s and the challenges they face in getting a handle on cloud costs.
The post Kubernetes is the key to cloud, but cost conta… Continue reading Kubernetes is the key to cloud, but cost containment is critical

Cloud security, hampered by proliferation of tools, has a “forest for trees” problem

C-Suites executives have cybersecurity insecurities around cloud development, deployment and visibility, a Palo Alto Networks survey finds.
The post Cloud security, hampered by proliferation of tools, has a “forest for trees” problem appeared first on… Continue reading Cloud security, hampered by proliferation of tools, has a “forest for trees” problem

GitHub rolling out two-factor authentication to millions of users

Over the next nine months, the largest internet hosting service for software development and collaboration will make all code contributors add another layer of electronic evidence to their accounts.
The post GitHub rolling out two-factor authentication… Continue reading GitHub rolling out two-factor authentication to millions of users

ChatGPT powers up Salesforce’s Einstein AI

Salesforce is making CRM talkative by integrating OpenAI’s ChatGPT generative AI model, to give chat functions to Slack, Einstein AI and other platforms.
The post ChatGPT powers up Salesforce’s Einstein AI appeared first on TechRepublic.
Continue reading ChatGPT powers up Salesforce’s Einstein AI

CrowdStrike: Attackers focusing on cloud exploits, data theft

CrowdStrike’s new threat report sees a big increase in data theft activity, as attackers move away from ransomware and other malware attacks, as defense gets better, and the value of data increases.
The post CrowdStrike: Attackers focusing on cloud exp… Continue reading CrowdStrike: Attackers focusing on cloud exploits, data theft

New National Cybersecurity Strategy: resilience, regs, collaboration and pain (for attackers)

The Biden administration’s National Cybersecurity Strategy aims to go after attackers, cultivate a resilience-first defensive posture and build public, private and international collaboration.
The post New National Cybersecurity Strategy: resilience, r… Continue reading New National Cybersecurity Strategy: resilience, regs, collaboration and pain (for attackers)