What Building Application Security Into Shadow IT Looks Like

June 24, 2024 at 03:02PM Application security programs are often challenging, with overloaded staff and communication issues. Despite these hurdles, a team successfully resolved 70,000 out of 80,000 security vulnerabilities in three months. Citizen developers are pervasive in enterprises, creating unique security challenges. A successful AppSec program for citizen developers requires automation, self-service, and adherence … Read more

Trends at the 2024 RSA Startup Competition

May 22, 2024 at 01:03PM The RSA Conference 2024’s Innovation Sandbox highlighted emerging trends in AI security, deepfake detection, AI data security, and automation’s identity management. Reality Defender won for its deepfake detection capabilities, as startups showcased advanced AI security and detection technology. Startups are adapting to AI adversaries and data vulnerabilities, foreseeing reinvention of … Read more

Machine Identity Firm Venafi Readies for the 90-day Certificate Lifecycle

May 1, 2024 at 10:15AM Google proposed a 90-day limit for digital certificate lifespans, which would significantly impact enterprise certificate management. While this move aims to improve cybersecurity and prepare for quantum-proof certificates, it will also increase complexity for enterprises. Venafi has introduced a 90-Day TLS Readiness solution to automate and manage the transition effectively. … Read more

How to Red Team GenAI: Challenges, Best Practices, and Learnings

April 29, 2024 at 10:07AM GenAI is transforming work processes, but its implementation poses risks including data security and misuse. Red teaming, especially for GenAI, requires considering responsible AI risks and dealing with probabilistic outputs. Microsoft employs an open automation framework, PyRIT, to red team its GenAI systems, ensuring proactive security and responsible innovation. The … Read more

The best RMM software

March 21, 2024 at 08:31AM RMM software provides IT support teams with tools to administer an entire system remotely, eliminating the need for in-person visits. It allows for remote access, automatic scanning for problems, and fixing issues without physical interaction. Leading RMM software includes NinjaOne, Syncro, Barracuda, N-able N-sight, ManageEngine RMM, and Site24x7 MSP Edition. … Read more

Microsoft Copilot for Security prepares for April liftoff

March 13, 2024 at 12:07PM Microsoft Copilot for Security, a subscription AI security service, will be available on April 1, 2024. The service provides generative AI in standalone and embedded modes and is based on GPT-4 and a Microsoft security-specific model. It aims to defend at machine speed, reduce security talent shortage, and improve productivity. … Read more

The Imperative for Modern Security: Risk-Based Vulnerability Management

February 29, 2024 at 07:57AM The news has been filled with reports of various vulnerabilities being exploited, highlighting the urgent need for organizations to modernize their vulnerability management practices. With the rise in cyber threats, organizations face resource constraints and challenges in patch management, making a risk-based approach essential for prioritizing and managing vulnerabilities effectively. … Read more

Artificial Arms Race: What Can Automation and AI do to Advance Red Teams

February 27, 2024 at 07:27AM The text discusses the significance of Red Teams for security stress tests and outlines their current state-of-the-art. It emphasizes the need for a well-defined security program and the role of human operators. It also explores the potential of automation and AI in Red Team engagements, such as asset discovery, ransomware … Read more

Palo Alto Networks Launches Cortex Platform Offer

February 23, 2024 at 03:52PM Palo Alto Networks introduces a new Cortex platform offer for endpoint security, helping organizations upgrade their protection against cyberthreats. This offer includes a “no-cost” period and professional services for a smooth transition to Cortex XDR. The platform is recognized for its effectiveness in identifying and addressing threats. The limited-time offer … Read more

Tips on meeting complex cloud security challenges

February 23, 2024 at 08:46AM “Join Palo Alto Networks’ webinar on 26 February to learn about the challenges of cyber threats, technology refresh cycles, and multi-cloud architectures. Discover how Prisma Cloud, a cloud-native application protection platform, provides automated policy management and ‘code-to-cloud’ security. The session will also cover advanced remediation capabilities and practical demonstrations. Register … Read more