What AppSec and developers working in cloud-native environments need to know

All enterprise organizations are, in essence, software publishers, regardless of their industry. This is because every enterprise relies on custom software applications for managing internal processes, interacting with customers, or analyzing data, mak… Continue reading What AppSec and developers working in cloud-native environments need to know

Balancing budget and system security: Approaches to risk tolerance

Data breaches are a dime a dozen. Although it’s easy to look at that statement negatively, the positive viewpoint is that, as a result, cybersecurity professionals have plenty of learning moments. Learning what went wrong and why can be a good sanity c… Continue reading Balancing budget and system security: Approaches to risk tolerance

Modernizing fraud prevention with machine learning

The number of digital transactions has skyrocketed. As consumers continue to spend and interact online, they have growing expectations for security and identity verification. As fraudsters become savvier and more opportunistic, there’s an increased nee… Continue reading Modernizing fraud prevention with machine learning

Great security training is a real challenge

All employees need security training, yet it’s generally a resented afterthought. A variety of studies over years show that human error is generally felt to be the largest vulnerability in organizations. For technology companies like SaaS providers, wh… Continue reading Great security training is a real challenge

Serial cybersecurity founders get back in the game

“I didn’t really have a choice,” says Ben Bernstein, the former CEO and co-founder of Twistlock (acquired by Palo Alto Networks in 2019) and the CEO and co-founder of a new cybersecurity startup that is still in stealth. “Building a start-up from the g… Continue reading Serial cybersecurity founders get back in the game

September 2023 Patch Tuesday forecast: Important Federal government news

Microsoft addressed 33 CVEs in Windows 10 and 11 last month after nearly 3x that number in July. But despite the lull in CVEs, they did provide new security updates for Microsoft Exchange Server, .NET Framework, and even SQL Server, so there were plent… Continue reading September 2023 Patch Tuesday forecast: Important Federal government news

3 ways to strike the right balance with generative AI

To find the sweet spot where innovation doesn’t mean sacrificing your security posture, organizations should consider the following three best practices when leveraging AI. Implement role-based access control In the context of generative AI, having pro… Continue reading 3 ways to strike the right balance with generative AI

Emerging threat: AI-powered social engineering

Social engineering is a sophisticated form of manipulation but, thanks to AI advancements, malicious groups have gained access to highly sophisticated tools, suggesting that we might be facing more elaborate social engineering attacks in the future. It… Continue reading Emerging threat: AI-powered social engineering

Connected cars and cybercrime: A primer

Original equipment suppliers (OEMs) and their suppliers who are weighing how to invest their budgets might be inclined to slow pedal investment in addressing cyberthreats. To date, the attacks that they have encountered have remained relatively unsophi… Continue reading Connected cars and cybercrime: A primer

5 ways in which FHE can solve blockchain’s privacy problems

Blockchain technology has gained significant traction due to its decentralized nature and immutability, providing transparency and security for various applications, especially in finance. Having gained notoriety during the 2010s with the boom of crypt… Continue reading 5 ways in which FHE can solve blockchain’s privacy problems