Learn to Secure Petabyte-Scale Data in a Webinar with Industry Titans

June 14, 2024 at 08:30AM “Data is rapidly expanding, with businesses of all sizes managing petabytes. The data is continuously accessed and analyzed, posing challenges for securing such a dynamic landscape. An upcoming webinar features industry experts discussing adapting security strategies, access control, third-party data risks, and future-proofing for big data era. Essential for data … Read more

Token Security Launches Machine-Centric IAM Platform

May 9, 2024 at 08:50AM Token Security provides a “machine-first” identity security platform for managing identities in the cloud and microservices era, focusing on visibility and continuous threat exposure management. The platform integrates with major infrastructure platforms and identity providers, and has secured $7 million in seed funding. Founders Itamar Apelblat and Ido Shlomo have … Read more

Physical security biz exposes 1.2M files via unprotected database

May 7, 2024 at 06:35AM UK-based physical security business Amberstone Security exposed nearly 1.3 million documents, including pictures of guards and suspected offenders, through a misconfigured public database. The exposed data raised concerns about personal privacy, public safety, and the integrity of security operations. After notification, Amberstone revoked public access to the database and initiated … Read more

Knostic Brings Access Control to LLMs

April 12, 2024 at 08:41AM Security startup Knostic emerged from stealth with $3.3 million pre-seed funding to address AI adoption challenges. Co-founder Gadi Evron emphasizes the need for personalized “need to know” access controls for large language models. Knostic’s approach enables tailored information access based on the user’s role, enhancing data privacy and AI adoption. … Read more

Knostic Emerges From Stealth With Enterprise Gen-AI Access Controls

April 11, 2024 at 10:48AM Knostic, a startup founded in late 2023 by cybersecurity veterans Gadi Evron and Sounil Yu, has emerged from stealth mode with $3.3 million in pre-seed funding. They have developed an access control solution for enterprises using generative AI to provide personalized need-to-know access control for large language models, preventing sensitive … Read more

How Not to Become the Target of the Next Microsoft Hack

March 11, 2024 at 10:07AM Recent cybersecurity incidents emphasize the importance of understanding and effectively implementing security best practices within the Microsoft 365 ecosystem. The increasing use of AI in cybersecurity calls for proactive measures to address evolving threats. Key strategies include reviewing access control policies, managing delegations, and maintaining control over the cloud environment … Read more

Secrets Sensei: Conquering Secrets Management Challenges

March 8, 2024 at 06:09AM In the cybersecurity realm, secrets management is essential in safeguarding sensitive data. This involves avoiding common mistakes such as hard coding secrets, inadequate key rotation, public storage, and over-provisioning of privileges. Additional pitfalls include improper lifecycle management, lack of audit trails, and failure to encrypt Kubernetes secrets. Strategies for remedying … Read more

Hikvision Patches High-Severity Vulnerability in Security Management System

March 4, 2024 at 08:48AM Hikvision has released patches for two vulnerabilities in its security management system HikCentral Professional. The more serious flaw, CVE-2024-25063, could lead to unauthorized access to specific URLs. The second bug, CVE-2024-25064, requires authentication to be exploited. Hikvision urges customers to apply the patches promptly, as prior vulnerabilities have been exploited. … Read more

Web Security Expands into Secure Service Edge (SSE)

December 8, 2023 at 06:52PM Trend Micro introduces Secure Service Edge (SSE) to address evolving cyber threats with Zero Trust principles, offering proactive risk control through ZTSA Internet Access. The platform’s ASRM and XDR capabilities empower users to detect critical incidents and enhance security posture. ZTSA delivers end-to-end application traffic management, data security, and risk … Read more

Three Ways Varonis Helps You Fight Insider Threats

November 15, 2023 at 05:45AM Insider threats, where confidential information is stolen by employees or insiders, are difficult for organizations to combat. Varonis offers a data security triad approach to reduce the risk and impact of insider attacks. This approach includes sensitivity (discovery, classification, and controls), access (security and permissions management), and activity (monitoring and … Read more