Proofpoint Signs Definitive Agreement to Acquire Tessian

November 1, 2023 at 03:47PM Proofpoint Inc. has announced that it will acquire Tessian, a company specializing in using advanced AI to detect and protect against accidental data loss and evolving email threats. The acquisition is expected to close in late 2023 or early 2024, pending regulatory approval. The addition of Tessian will enhance Proofpoint’s … Read more

Palo Alto Networks to Acquire Cloud Security Start-Up Dig Security

October 31, 2023 at 02:22PM Palo Alto Networks has announced its acquisition of Dig Security, an Israeli company specializing in Data Security Posture Management (DSPM) technology. Dig Security’s solution helps organizations protect sensitive data in the cloud, and it will be integrated into Palo Alto’s Prisma Cloud platform. Analysts see the acquisition as a strategic … Read more

Getting Smart With Cybersecurity: AI Can Help the Good Guys, Too

October 30, 2023 at 03:08AM The Dartmouth Conference in 1955 predicted that machines could simulate aspects of intelligence through precise descriptions. AI research progressed slowly until language tools like ChatGPT emerged, presenting both risks and benefits. IT professionals are concerned about cybercriminals using these tools, but still plan to integrate AI into their security programs. … Read more

WatchGuard Launches MDR Service, Helps MSPs Accelerate Cybersecurity Service Delivery

October 26, 2023 at 05:56PM WatchGuard Technologies has announced the launch of WatchGuard MDR, a cybersecurity service designed to make MDR more accessible to managed service providers (MSPs). The service, managed by a team of cybersecurity experts and powered by AI, eliminates the need for investment in traditional security operation center infrastructure. It offers advanced … Read more

Critical Infrastructure Stakeholders Gather for Day 2 of SecurityWeek’s 2023 ICS Cybersecurity Conference

October 25, 2023 at 09:21AM SecurityWeek’s 2023 ICS Cybersecurity Conference in Atlanta continues today with industrial cybersecurity stakeholders gathering for Day 2. Highlights include an interactive tabletop exercise for incident response, discussions on converging IT/OT security operations, assessing insider threats, securing industrial wireless infrastructure, emulating adversary actions, quantum computing’s impact on OT security, and using … Read more

Microsoft opens early access to AI assistant for infosec, Security Copilot

October 23, 2023 at 09:08AM Microsoft is launching the early access program for Security Copilot, an AI cybersecurity tool embedded in the Microsoft 365 Defender XDR platform. The tool aims to save time for security teams by providing step-by-step instructions on managing incidents and offering insights to upskill existing staff. It can generate natural language … Read more

Microsoft Offers Up to $15,000 in New AI Bug Bounty Program

October 13, 2023 at 06:18AM Microsoft has launched a bug bounty program specifically focused on vulnerabilities in its artificial intelligence (AI)-powered Bing search engine. The program offers rewards of up to $15,000 for vulnerabilities found in bing.com and associated applications. Microsoft is particularly interested in vulnerabilities related to inference manipulation, model manipulation, and inferential information … Read more

Applying AI to API Security

October 11, 2023 at 08:24AM AI can add value to API security in several ways. Firstly, it can be used for API discovery, studying request and response data to uncover unknown API endpoints. Secondly, AI can enforce schemas and improve access control by observing and mitigating deviations from learned schemas. Thirdly, AI can identify and … Read more

October 10, 2023 at 10:06AM – Old-School Attacks Are Still a Danger, Despite Newer Techniques

October 10, 2023 at 10:06AM Many cybercriminals still rely on non-sophisticated attacks because they are effective. These include phishing attacks and credential harvesting, often obtained through social engineering. Automation and AI are increasingly being used by bad actors to conduct attacks more efficiently. To defend against these attacks, organizations need to bolster human defenses through … Read more