This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Due to be adopted as law by member states by October 2024, the EU Network and InformationSystems (NIS2) Directive is the most important cybersecurity legislation ever enacted across member states. At that time, cybersecurity was seen primarily as a problem faced by individual organizations.
Check out the new ARIA program from NIST, designed to evaluate if an AI system will be safe and fair once it’s launched. In addition, Deloitte finds that boosting cybersecurity is key for generative AI deployment success. And why identity security is getting harder. And much more! To help answer it, the U.S.
Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips.
Tasked with securing your org’s new AI systems? Plus, open source security experts huddled at a conference this week – find out what they talked about. That’s the topic of the paper “ Securing AI: Similar or Different? published by Google’s Cybersecurity Action Team. ” published by Google’s Cybersecurity Action Team.
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. Please join us for a discussion on automated removal of cyber threats on Thursday June 12 at 11am eastern for a webinar that will provide insights on how to execute on automating for defense. Register here.
As 2022 ends, we highlight important data points that shine a light on the trends, challenges and best practices that matter to cybersecurity leaders eager to boost their exposure management and reduce their organizations’ cyber risk. . Dive into six illuminating cybersecurity research findings of 2022. Tenable’s Log4j resource page.
If you are a technologist you no doubt have thoughts about security and how to improve your approach to enterprise-wide defense. Please join us for a discussion on automated removal of cyber threats on Thursday June 12 at 11am eastern for a webinar that will provide insights on how to execute on automating for defense. Register here.
powered voice transcription service which already integrates with Zoom for recording online meetings and webinars, is today bringing its service to Google Meet’s over 100 million users. Other systems, meanwhile, tend to just offer live captions during the meeting itself. Otter.ai , the A.I.-powered However, in this case, Otter.ai
Meanwhile, the CSA published a paper outlining the unique risks involved in building systems that use LLMs. The post-quantum encryption standards are designed to secure “a wide range of electronic information,” including email messages and e-commerce transactions, the U.S. Plus, MIT launched a new database of AI risks.
MIT Center for InformationSystems Research The MIT Center for InformationSystems Research (MIT CISR) operates as a research center in Sloan School of Management at the Massachusetts Institute of Technology. By joining FIRST, CIOs gain access to a diverse network of more than 700 global security experts. “It
For utilities and manufacturers tasked with keeping their lights on during the COVID-19 response, scaled-down workforces can pose increased security risks. While most industrial operations are largely automated today, these connected systems can also be the Achilles’ heel of the entire operation.
To Ivanti’s Valued Customers and Partners, Our organization strives to produce the most secure solutions for Everywhere Work. Events in recent months have been humbling, and I want you to hear directly from me about the actions we are taking to ensure we emerge stronger, and our customers are more secure. And there is more to come.
CISA’s red team acted like a nation-state attacker in its assessment of a federal agency’s cybersecurity. Plus, the Cloud Security Alliance has given its cloud security guidance a major revamping. And the latest on open source security, CIS Benchmarks and much more!
As COVID-19 drives many government agencies to quickly migrate from a centralized to remote workforce, new cybersecurity questions arise. This immediate expansion of the attack surface introduces new uncertainties and increased risk, raising important questions: How can we manage and secure these new assets?
A year after the ransomware attack against the Colonial Pipeline, what can we do to further harden the IT and OT systems of power plants, fuel pipelines, water treatment plants and similar critical infrastructure facilities? government, CISOs, cybersecurity vendors and the public at large. CISOs, CIOs and business leaders.
Want to learn more about protecting AI systems from malicious actors? Plus, new granular configuration recommendations for securing Microsoft 365 are out. 1 - NIST categorizes cyberattacks against AI systems Are you involved with securing the artificial intelligence (AI) tools and systems your organization uses?
Looking for guidance on developing AI systems that are safe and compliant? Plus, a new survey shows generative AI adoption is booming, but security and privacy concerns remain. publish recommendations for building secure AI systems If you’re involved with creating artificial intelligence systems, how do you ensure they’re safe?
The future belongs to cybersecurity leaders who can align their objectives with an understanding of business risk. I've been working in cybersecurity for 20 years. I've run intrusion detection programs and security operations centers and was responsible for policy and compliance of all those components.
1 - New version of MITRE ATT&CK adds guidance on generative AI, cloud threats Information about malicious use of generative AI tools. Advice about securing cloud environments. healthcare system in history” by Rick Pollack, President and CEO of the American Hospital Association.
Traditional systems often can’t support the demands of real-time processing and AI workloads,” notes Michael Morris, Vice President, Cloud, CloudOps, and Infrastructure, at SAS. These systems are deeply embedded in critical operations, making data migration to the cloud complex and risky,” says Domingues.
And get the latest on ransomware trends, vulnerability management practices and election security! 1 - Guide outlines logging and threat detection best practices As attackers double down on the use of stealthy, hard-to-detect “living off the land” (LOTL) techniques, cybersecurity teams should improve how they log events and detect threats.
As Tenable's chief security officer I'm simultaneously protecting our own systems while addressing the concerns of our customers around the world. The security and availability of our systems, products and customer data is of the utmost importance to us. Here's what I've learned so far. .
As the number of IoT devices deployed globally continues to rise, cyber-physical systems and business operations are exposed to greater risk. Not only do IoT devices introduce more entry points for potential attackers, but many of these devices are often overlooked by traditional security efforts.
Check out the NCSC’s call for software vendors to make their products more secure. And the latest on the cybersecurity skills gap in the U.S. 1 - NCSC issues “code of practice” for software makers Software vendors improve the security of their products. And much more! That’s the goal of the U.K. The document from the U.K.’s
On August 27, LogRhythm hosted a panel focused on “Tapping Global Threat Intelligence to Secure Enterprise Networks” at Ruth’s Chris Steakhouse in Crystal City. The panel participants included Sameer Bhalotra , COO of Impermium and former Senior Director for Cybersecurity at the White House; Bob Gourley , Partner at Cognitio; Todd G.
As we bid adieu to 2023, we highlight major trends that impacted cybersecurity professionals in the past 12 months. Learn how the cyber world changed in areas including artificial intelligence, CNAPP, IAM security, government oversight and OT security. Cybersecurity teams were no exception.
Plus, how to cut cyber risk when migrating SCADA systems to the cloud. The 52-page report, titled “ Managing Artificial Intelligence-Specific Cybersecurity Risks in the Financial Services Sector, ” touches on cybersecurity and fraud protection; fraud threats; the regulatory landscape; and major challenges and opportunities.
Plus, the IT-ISAC says that ransomware attacks fell in Q2 due to law-enforcement disruptions of ransomware groups. Meanwhile, check out a Carnegie Mellon comp sci professor’s take on AI systemsecurity. Security teams that use AI and automation extensively for prevention experience an average of $2.2 And much more!
It's time for Operational Technology (OT) environments to pursue a more proactive approach to cybersecurity by making cyber maintenance as much of a routine practice as the mechanical maintenance of systems and equipment. Department of Homeland Security. Regulatory compliance does not equal security.
Meanwhile, critical infrastructure orgs have a new framework for using AI securely. And get the latest on the BianLian ransomware gang and on the challenges of protecting water and transportation systems against cyberattacks. Dive into six things that are top of mind for the week ending Nov.
IT systems and resources must be rationalized and unified, and differing cultures must often be maneuvered toward alignment to ensure success going forward. However, I wasn’t awestruck because of my involvement in the duediligence of the merger and acquisition process from day one. How are you planning to integrate them?
Meanwhile, the OpenSSF published 10 key principles for secure software development. Cybersecurity and Infrastructure Security Agency (CISA) issued a clarion call for software makers to use so-called “memory safe” programming languages. Plus, malware used in fake browser-update attacks ballooned in Q3. And much more!
A group that includes the Cloud Security Alliance, CISA and Google is working to compile a comprehensive collection of best practices for secure AI use. Meanwhile, check out a draft of secure configuration recommendations for the Google Workspace suite. Dive into six things that are top of mind for the week ending December 15.
Webinar FAQ In the recent webinar titled “Communication Between Loosely Coupled Microservices” we got a lot of great questions and because of the limited time some were left unanswered. What Was The Webinar About? The webinar covered different styles of communication. Communication Between Loosely Coupled Microservices?—?Webinar
Did you know that 81 percent of data breaches are due to weak or stolen passwords? Yet many businesses have not attempted to close this security gap. Some organizations, especially government agencies, are often slow at updating their technology and processes due to budget constraints and other factors.
Securities and Exchange Commission (SEC)began enforcing new cybersecurity disclosure rules. Recognizing the critical need for transparency and robust cybersecurity measures, the U.S. As part of their fiduciary duties, boards play a key role in the oversight of risks from cybersecurity threats.
Plus, JCDC will put special focus on critical infrastructure security in 2024. Meanwhile, CISA and OpenSSF shine a spotlight on the security of software package repositories. Review ChatGPT 3.5’s Improve critical infrastructure’s cybersecurity foundation. And scammers leveraged tech tools to steal $10 billion from U.S.
While there is endless talk about the benefits of using ChatGPT, there is not as much focus on the significant security risks surrounding it for organisations. JPMorgan Chase has limited employees’ usage of ChatGPT due to compliance concerns. What are the dangers associated with using ChatGPT? Phishing 2.0:
And a poll on water plant cybersecurity. Cybersecurity and Infrastructure Security Agency (CISA), the FBI and law enforcement agencies from the U.S., Check out a CISA-FBI advisory about North Korean cyber espionage on critical infrastructure orgs. Plus, what Europol found about the use of AI for cybercrime. And much more!
How to prepare your edtech systems and prevent security breaches. By Rich Gay, PowerSchool Chief InformationSecurity Officer & & Vice President of Development. The threat of a hack into your school or district’s edtech systems is any K-12 tech director’s constant worry. An ounce of prevention….
Cybersecurity is a major concern for SMBs and also the biggest challenge. To stay a step ahead of cybercriminals you need to be aware of the latest cybersecurity trends, so you can take the required precautions with your data and infrastructure. Businesses need to double down on basic security measures. Cryptojacking.
Life is getting harder for cybersecurity pros, but there are ways to improve working conditions. Meanwhile, there’s a new, free attack-emulation tool for OT security teams. 2 - OT security teams get new adversary-emulation tool Are you tasked with securing your organization’s operational technology (OT) systems?
However, this shift requires a thorough understanding of the security implications and how a business can protect its data and applications. As with all technology introductions, it’s important to have clear security policies, tools, processes, and training. Watch on-demand here. How is the cloud being attacked and why?
1 - CISA: Critical infrastructure orgs susceptible to common attacks After assessing the security of 143 critical infrastructure organizations in 2023, the U.S. Each of the 143 critical infrastructure organizations received a report about their network security results, mapped to the MITRE ATT&CK framework. Coast Guard (USCG).
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content