The use of AI-assisted coding has the potential to revolutionize the way we develop software, but it also poses new risks to cybersecurity. It is important for organizations to understand the potential for malicious use of AI models and take proactive steps to mitigate these risks.
While OpenAI’s ChatGPT tool features a number of safeguards, that’s not stopping hackers from trying to make use of the tool for malicious intent.
- By Brent Dirks
- Jan 19, 2023
Looking forward, Darktrace is offering its 2023 Predictions, including where we can expect to see changes in MFA where accessibility and usability continue to dominate the discussion; continued Hactivism from non-state actors where ‘know thy enemy,
- By Marcus Fowler
- Jan 18, 2023
More organizations today are relying on cloud-based solutions to transform and grow their business than ever before. All major cloud service providers, including Google, Amazon, Microsoft and IBM, have seen astonishing growth in cloud-solution revenue over the last few years, and there is no slowdown in sight.
- By Jennifer Hones
- Jan 09, 2023
Cybersecurity has dominated the headlines in recent years as cyber attacks have risen at an increasingly alarming rate. In fact, global attacks increased by 28% in the third quarter of 2022 compared to the same period in 2021.
- By Brad Jones
- Dec 14, 2022
Blockchain technology was built in part on a principle of high-level security, but it is increasingly clear that this is not always the case, as noted by a recent DARPA analysis noting how cryptocurrency tech is vulnerable to tampering.
- By Shashi Kiran
- Dec 12, 2022
The infrastructure of the United States is under attack, as foreign criminals use advanced skills and exploit company vulnerabilities to cripple operations, disrupt industrial control systems, and ultimately inflict significant damage, both monetarily and economically.
- By Dominick Birolin
- Dec 05, 2022
Wouldn’t it be nice to have a crystal ball to understand exactly what we can expect in 2023 from the Cybersecurity world?
- By Ralph C. Jensen
- Dec 02, 2022
Security requirements are constantly evolving and one of the most pressing impacts of this evolution today centers on cybersecurity. Two aspects need to be addressed: the physical security of digital networks and the cybersecurity of physical security devices.
- By Ben Williams
- Dec 01, 2022
Access control systems exist to improve security for organizations, but if the hardware and software are not up to date, the system may be vulnerable to cybersecurity threats and other risks.
- By Despina Stamatelos
- Dec 01, 2022
Fortanix® Inc. has announced that Fortanix Data Security Manager (DSM) now works with the AWS KMS External Key Store (XKS), allowing organizations that deal with regulated data to run workloads on AWS by segregating data on AWS infrastructure from encryption keys.
The digital economy quite literally runs on open source. Ninety-nine percent of Fortune 500 companies use open source software, most of the cloud runs on Linux, and Apache and Nginx webservers power more than 60% of the world’s websites.
- By Santiago Bassett
- Nov 30, 2022
A look ahead to 2023 we can expect to see changes in MFA, continued Hactivism from non-state actors, CISOs lean in on more proactive security and crypto-jackers will get more perceptive.
- By Marcus Fowler
- Nov 21, 2022
Vulcan Cyber, developers of the unified cyber risk and security posture management platform, recently announced the latest results of its ongoing research into vulnerability risk management initiatives and risk impact on business operations. The survey finds 75% of organizations have dedicated threat intelligence teams and two-thirds have dedicated threat intelligence budgets
IT and security leaders must address, on average, one cyberattack per week according to a new study released titled “The State of Data Security” by Rubrik Zero Labs. Rubrik, the Zero Trust Data Security Company, commissioned a study from Wakefield Research to gather insights from more than 1,600 security and IT leaders including CISOs, CIOs, VPs, and Directors across 10 countries.
When it comes to cybersecurity, many organizations overlook IoT devices; but it is imperative that they are given equal consideration, as these devices are connected to the internet (i.e. printers, security cameras and smart home hubs) and can serve as an open door for cyber criminals.
- By Mark Sinanian
- Nov 04, 2022
SonicWall recently released new threat data through the third quarter of 2022. SonicWall recorded more than 4 billion malware attempts globally while year-to-date ransomware attempts in 2022 have already exceeded full-year totals from four of the last five years. In the recent 2022 SonicWall Cyber Threat Mindset Survey, 91% of organizations reported that they are most concerned about ransomware attacks, indicating a rise of anxiety among security professionals.
Cloud data security is a serious challenge most organizations face today. The cloud was designed for collaboration where every file or data element can be shared with anyone halfway around the globe. Cloud data can also be copied, duplicated, modified and passed along very easily. To illustrate the challenge, think about 100 different variations of a redlined sensitive contract that need to be protected, and consider that each variant can have different access privileges.
- By Karthik Krishnan
- Oct 27, 2022
As cybersecurity awareness month continues to be a focus of discussion in October, new research conducted by Genetec, technology provider of unified security, public safety, operations, and business intelligence solutions, shows that cybersecurity remains a top concern for physical security professionals going into 2023.
Cyber Awareness Month is upon us and we want to share some of our best practices for what organizations can do to enhance their security posture while remaining vigilant to stay ahead of threats as best they can.
- By Chris Strand
- Oct 20, 2022