Organizations should prepare for the inevitability of cyberattacks on their infrastructure
Organizations reliance on technology has contributed to the fact that their attack surface has grown in size and complexity, according to Armis. Global organizations are facing an unprecedented level of cyber risk due to blind spots in their environm.....»»
Skyhawk Security unveils cloud-native CTEM, streamlining security with AI-powered automation
Skyhawk Security has unveiled its cloud native Continuous Threat Exposure Management (CTEM) solution. The agentless approach empowers organizations to automate their CTEM program for the first time and operationalize it through Skyhawk’s existing A.....»»
Dropbox says attackers accessed customer and MFA info, API keys
File hosting service Dropbox has confirmed that attackers have breached the Dropbox Sign production environment and accessed customer personal and authentication information. “From a technical perspective, Dropbox Sign’s infrastructure is lar.....»»
Texans should prepare for hotter temperatures, greater risk of fire and flooding
Weather conditions across the Lone Star State are getting more extreme and more dangerous by the year, according to a new report from Texas A&M University professor and State Climatologist John Nielsen-Gammon......»»
Essential steps for zero-trust strategy implementation
63% of organizations worldwide have fully or partially implemented a zero-trust strategy, according to Gartner. For 78% of organizations implementing a zero-trust strategy, this investment represents less than 25% of the overall cybersecurity budget......»»
Cybersixgill Third-Party Intelligence module identifies potential supply chain risks
Cybersixgill, the global cyber threat intelligence data provider, broke new ground by introducing its Third-Party Intelligence module. The new module delivers vendor-specific cybersecurity and threat intelligence to organizations’ security team.....»»
eBook: Do you have what it takes to lead in cybersecurity?
Organizations worldwide need talented, experienced, and knowledgeable cybersecurity teams who understand the advantages and risks of emerging technologies. Aspiring leaders in the cybersecurity field need more than just job experience. They need a di.....»»
Critics question tech-heavy lineup of new Homeland Security AI safety board
CEO-heavy board to tackle elusive AI safety concept and apply it to US infrastructure. Enlarge (credit: Benj Edwards | Getty Images) On Friday, the US Department of Homeland Security announced the formation of an Artific.....»»
UK enacts IoT cybersecurity law
The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect today, requiring manufacturers of consumer-grade IoT products sold in the UK to stop using guessable default passwords and have a vulnerability disclosure poli.....»»
DHS establishes AI Safety and Security Board to protect critical infrastructure
The Department of Homeland Security announced the establishment of the Artificial Intelligence Safety and Security Board (the Board). The Board will advise the Secretary, the critical infrastructure community, other private sector stakeholders, and t.....»»
AI is creating a new generation of cyberattacks
Most businesses see offensive AI fast becoming a standard tool for cybercriminals, with 93% of security leaders expecting to face daily AI-driven attacks, according to Netacea. Offensive AI in cyberattacks The research, “Cyber security in the age o.....»»
Closing the cybersecurity skills gap with upskilling programs
The list of skills technologists and organizations need to succeed grows with each new tech advancement, according to Pluralsight. But for many organizations, budgets and staff continue to shrink. This survey asked 1,400 executives and IT professiona.....»»
What AI can tell organizations about their M&A risk
Following the past few years of economic turbulence, merger and acquisition (M&A) activity is on the rise in 2024, with several acquisition deals being announced in the first few months of the year valued at billions of dollars. With the surge of AI.....»»
FCC restores net neutrality rules that ban blocking and throttling in 3-2 vote
Broadband lobby groups prepare lawsuit, calling rules a "net fatality." Enlarge / Federal Communication Commission Chairwoman Jessica Rosenworcel, then a commissioner, rallies against repeal of net neutrality rules in December 20.....»»
Edgio Client-Side Protection enables organizations to secure critical customer data
Edgio released its Client-Side Protection solution. Designed to monitor scripts and APIs on the browser-side to prevent malicious code from exfiltrating sensitive customer data, Edgio Client-Side Protection allows teams to gain full visibility on cli.....»»
Anatomy IT’s new Security Suite targets healthcare cybersecurity threats, improves incident response
Anatomy IT has announced the launch of an expanded end-to-end cybersecurity product suite designed to safeguard healthcare delivery organizations from evolving and growing IT system threats. A record 133 million individuals were affected by healthcar.....»»
A shade closer to more efficient organic photovoltaics
Transparent solar cells will transform the look of infrastructure by enabling many more surfaces to become solar panels. Now, materials called non-fullerene acceptors that can intrinsically generate charges when exposed to sunlight could make semitra.....»»
Zero Networks unveils identity segmentation solution to prevent credential theft
Zero Networks announced the addition of identity segmentation capabilities within the Zero Networks platform. As stolen credentials remain a top threat facing organizations, this new identity segmentation solution stops privileged account abuse by au.....»»
New Relic AI monitoring helps enterprises use AI with confidence
New Relic announced New Relic AI monitoring with a suite of new features to meet the evolving needs of organizations developing AI applications. New features include in-depth AI response tracing insights with real-time user feedback and model compari.....»»
The relationship between cybersecurity and work tech innovation
As organizations navigate the complexities of hybrid work arrangements and the gradual return to the office, the cybersecurity threat landscape has become increasingly challenging, with issues such as the proliferation of personal devices, the expans.....»»
Invicti Predictive Risk Scoring identifies highest-risk applications
Invicti announced its new AI-enabled Predictive Risk Scoring capability. The feature assigns predicted risk to applications and helps organizations gain a strategic view of their overall application security risk. Predictive Risk Scoring allows organ.....»»