AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime

Bringing artificial intelligence into the cybersecurity field has created a vicious cycle. Cyber professionals now employ AI to enhance their tools and boost their detection and protection capabilities, but cybercriminals are also harnessing AI for the… Continue reading AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime

Best practices for cloud configuration security

Cloud computing has become an integral part of IT infrastructure for businesses of all sizes, providing on-demand access to a wide range of services and resources. The evolution of cloud computing has been driven by the need for more efficient, scalable and cost-effective ways to deliver computing resources. Cloud computing enables on-demand access to a […]

The post Best practices for cloud configuration security appeared first on Security Intelligence.

Continue reading Best practices for cloud configuration security

Aim for a modern data security approach

Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Many organizations no long… Continue reading Aim for a modern data security approach

Three security data predictions for 2024

How do companies protect their digital environments in a world where everything is growing more complex, quickly – data, customer expectations, cyber threats and more? It’s difficult: Adversaries are adopting and using AI and even generative AI-based t… Continue reading Three security data predictions for 2024

2024 brings changes in data security strategies

2024 will be a revolutionary year for the data security landscape as Data Security Posture Management (DSPM) technology rapidly evolves to keep pace with the colossal amount of data being created, stored and shared within organizations and across busin… Continue reading 2024 brings changes in data security strategies

Bridging the risk exposure gap with strategies for internal auditors

In this Help Net Security interview, Richard Chambers, Senior Internal Audit Advisor at AuditBoard, discusses the transformational role of the internal audit function and risk management in helping organizations bridge the gap in risk exposure. He talk… Continue reading Bridging the risk exposure gap with strategies for internal auditors

Security leaders on high alert as GenAI poses privacy and security risks

Companies need help to get visibility into the operations of their AI programs, potentially reducing productivity while creating significant risks around governance, data security, and more. In this Help Net Security video, Neil Cohen, Head of Go-To-Ma… Continue reading Security leaders on high alert as GenAI poses privacy and security risks

Fail of the Week: This Flash Drive Will NOT Self-Destruct in Five Seconds

How hard can it be to kill a flash drive? Judging by the look of defeat on [Walker]’s face in the video below, pretty darn hard. To bring you up …read more Continue reading Fail of the Week: This Flash Drive Will NOT Self-Destruct in Five Seconds

AI and contextual threat intelligence reshape defense strategies

AI continues to evolve to improve both cyber defense and cyber criminal activities, while regulatory pressures, continued consolidation, and geopolitical concerns will drive more proactive cybersecurity efforts with contextual threat intelligence, acco… Continue reading AI and contextual threat intelligence reshape defense strategies

Consumers plan to be more consistent with their security in 2024

The vast majority of consumers are concerned that cyberattacks will increase or remain consistent over the coming year (97%) and become more sophisticated (69%), outpacing the ability of cyber defenses to protect against these threats, according to Thr… Continue reading Consumers plan to be more consistent with their security in 2024