The case for enterprise exposure management

For several years, external attack surface management (EASM) has been an important focus for many security organizations and the vendors that serve them. EASM, attempting to discover the full extent of an organization’s external attack surface and reme… Continue reading The case for enterprise exposure management

Three hard truths hindering cloud-native detection and response

According to Gartner, the market for cloud computing services is expected to reach $675 billion in 2024. Companies are shifting from testing the waters of cloud computing to making substantive investments in cloud-native IT, and attackers are shifting … Continue reading Three hard truths hindering cloud-native detection and response

3 easy microsegmentation projects

Like many large-scale network security projects, microsegmentation can seem complex, time-consuming, and expensive. It involves managing intricate details about inter-device service connectivity. One web server should connect to specific databases but … Continue reading 3 easy microsegmentation projects

Could APIs be the undoing of AI?

Application programming interfaces (APIs) are essential to how generative AI (GenAI) functions with agents (e.g., calling upon them for data). But the combination of API and LLM issues coupled with rapid rollouts is likely to see numerous organizations… Continue reading Could APIs be the undoing of AI?

3 tips for securing IoT devices in a connected world

IoT devices have become integral to how many organizations operate. From Smart TVs in conference rooms to connected sensors and wireless security cameras, these connected devices are now a fixture in the modern workplace. They also, however, present a … Continue reading 3 tips for securing IoT devices in a connected world

AI use: 3 essential questions every CISO must ask

In July, Wall Street experienced its worst day since 2022, with the tech-focused Nasdaq falling by 3.6%. The downturn was largely triggered by what commentators suggest is the result of underwhelming earnings from some major tech companies. What’s nota… Continue reading AI use: 3 essential questions every CISO must ask

How to detect and stop bot activity

Bad bot traffic continues to rise year-over-year, accounting for nearly a third of all internet traffic in 2023. Bad bots access sensitive data, perpetrate fraud, steal proprietary information, and degrade site performance. New technologies are enablin… Continue reading How to detect and stop bot activity

Differential privacy in AI: A solution creating more problems for developers?

In the push for secure AI models, many organizations have turned to differential privacy. But is the very tool meant to protect user data holding back innovation? Developers face a tough choice: balance data privacy or prioritize precise results. Diffe… Continue reading Differential privacy in AI: A solution creating more problems for developers?

Data disposal and cyber hygiene: Building a culture of security within your organization

Data breach episodes have been constantly rising with the number of data breach victims crossing 1 billion in the first half of 2024. A recent Data Breach Report 2023 by Verizon confirms that 74% of data breaches are due to human errors. Although cyber… Continue reading Data disposal and cyber hygiene: Building a culture of security within your organization

Gateways to havoc: Overprivileged dormant service accounts

Service accounts are non-human identities used to automate machine-to-machine interactions. They support critical functions – such as running scripts, services, and applications like websites, APIs, and databases – and facilitate integrations, op… Continue reading Gateways to havoc: Overprivileged dormant service accounts