Disruption in 2020 paves the way for threat actors in 2021 and beyond

There’s no doubt that 2020 will be remembered for the uncertainty and rapid change it brought. As the global pandemic accelerated trends like remote working and digital transformation, it has also created new cybersecurity challenges. However, although… Continue reading Disruption in 2020 paves the way for threat actors in 2021 and beyond

Security automation: Time for a new playbook

From increasingly sophisticated threats to the mad concoction of on-premise and cloud solutions that comprise most organizations’ IT infrastructure and the plethora of new IoT devices and a highly distributed workforce, enterprises and government agenc… Continue reading Security automation: Time for a new playbook

Researchers develop tool that automates device programming in the IoT

The Internet of Things (IoT) has ushered in a new era, with everyday items evolving into what we now refer to as cyber-physical systems. These systems are physical mechanisms controlled or monitored by computer algorithms and deeply intertwined through… Continue reading Researchers develop tool that automates device programming in the IoT

Secure enclave protection for AI and ML

You can’t swing a virtual bat without hitting someone touting the value of artificial intelligence (AI) and machine learning (ML) technologies to transform big data and human expertise. A new generation of businesses is promising to accelerate and auto… Continue reading Secure enclave protection for AI and ML

Under the Hood of Simon Data’s World-Class Application Security Program

Are you curious how CISOs with major data platforms handle their application security testing programs? So are we, which…
The post Under the Hood of Simon Data’s World-Class Application Security Program appeared first on ZeroNorth.
The post Under the H… Continue reading Under the Hood of Simon Data’s World-Class Application Security Program

Microsoft brings new process mining features to Power Automate

Power Automate is Microsoft’s platform for streamlining repetitive workflows — you may remember it under its original name: Microsoft Flow. The market for these robotic process automation (RPA) tools is hot right now, so it’s no surprise that Microsoft, too, is doubling down on its platform. Only a few months ago, the team launched Power […] Continue reading Microsoft brings new process mining features to Power Automate

Industrial pros looking for a more focused approach to digital transformation

A highly focused approach to digital transformation is challenging the traditional top-down, all-or-nothing strategy, according to a report from Plutoshift. The findings revealed just 25% of industrial professionals said digitizing their entire company… Continue reading Industrial pros looking for a more focused approach to digital transformation

Open source vulnerabilities go undetected for over four years

For its annual State of the Octoverse report, GitHub has analyzed over 45,000 active code directories to provide insight into open source security (vulnerabilities) and developers’ practices regarding vulnerability reporting, alerting and remedia… Continue reading Open source vulnerabilities go undetected for over four years