Join us in Atlanta on April 10th and explore the landscape of security workforce. We will explore the vision, benefits, and use cases of AI for security teams. Request an invite here. Enterprises’ reliance on AL/machine learning (ML) tools is surging by nearly 600%, escalating from 521 million transactions in April 2023 to 3.1 billion […]
Read MoreTag: CISOs
United Healthcare’s ransomware attack shows why supply chains are under siege
Join leaders in Boston on March 27 for an exclusive night of networking, insights, and conversation. Request an invite here. Healthcare supply chains are facing a digital pandemic, with the latest UnitedHealth Group breach showing the power of an orchestrated ransomware attack to shut down supply chains. Attackers hope to create chaos quickly to force […]
Read More4 strategies data-driven CISOs need to take now to defend their budgets
Enterprise organizations collectively spend billions of dollars every year on security tools and systems to protect them from an evolving threat landscape. Yet, despite the massive annual investment, the number of data breaches continues to rise. For the past decade, IT security budgets have been considered an untouchable line item in the budget and have […]
Read MoreHow AI is strengthening XDR to consolidate tech stacks
Deciphering weak telemetry signals by using AI to analyze behaviors and detect threats in real time is the future of extended detection and response (XDR). VentureBeat continues to see CISOs and their security teams migrate from Endpoint Detection and Response (EDR) to XDR for greater consolidation savings and a more unified view of all attack […]
Read MoreJob hunter’s guide to the top cybersecurity companies hiring in 2024
Economic uncertainty and tightened budgets weakened cybersecurity spending resilience in 2023, and the first causality was jobs. Cybersecurity budgets faced increased scrutiny last year, and security leaders expect the belt-tightening to intensify this year as many pursue a vendor consolidation strategy. “You have to be very judicious about where you’re spending,” said Steve Pugh, CISO […]
Read MoreWhy attackers love to target misconfigured clouds and phones
Join leaders in San Francisco on January 10 for an exclusive night of networking, insights, and conversation. Request an invite here. Data breaches tripled between 2013 and 2022, exposing 2.6 billion personal records in the past two years, with 2023 on its way to being a record year. These findings are from a recent report […]
Read MoreWhy attackers love to target misconfigured clouds and phones
Join leaders in San Francisco on January 10 for an exclusive night of networking, insights, and conversation. Request an invite here. Data breaches tripled between 2013 and 2022, exposing 2.6 billion personal records in the past two years, with 2023 on its way to being a record year. These findings are from a recent report […]
Read More16 Cybersecurity leaders predict how gen AI will improve cybersecurity in 2024
With greater AI power comes greater complexity, especially for CISOs adopting generative AI. Gen AI is the power surge cybersecurity vendors need to reduce the risks of losing the AI war. Meanwhile, adversaries’ tradecraft and new ways of weaponizing AI while combining social engineering have humbled many of the world’s leading companies this year. VentureBeat […]
Read MoreIBM’s 2024 predictions show gen AI is the new DNA of cyberattacks
Are you ready to bring more awareness to your brand? Consider becoming a sponsor for The AI Impact Tour. Learn more about the opportunities here. IBM predicts attackers will strengthen their arsenals with generative AI and take their attack tradecraft to a new, more lethal level in 2024. The new year signals the start of […]
Read MoreHow to protect unmanaged devices in today’s zero-trust world
All it takes is a single hijacked browser session or unprotected third-party device on a network to shut a business down, costing millions in lost productivity and revenue. Regarding browser attacks, many CISOs can’t forget how the CNA Financial breach started with a phishing email telling an admin to perform a browser update. Attackers infiltrated […]
Read MoreMeta champions a new era in safe gen AI with Purple Llama
Are you ready to bring more awareness to your brand? Consider becoming a sponsor for The AI Impact Tour. Learn more about the opportunities here. Realizing that generative AI development needs a hardened security framework with buy-in across the industry to make it more trusted and reduce the risks of attacks, Meta last week launched […]
Read MoreCisco goes all in on AI to strengthen its cybersecurity strategy
Are you ready to bring more awareness to your brand? Consider becoming a sponsor for The AI Impact Tour. Learn more about the opportunities here. Configuration complexity and rules are among organizations’ most lethal, accidental risks when configuring networks and firewalls. Gartner predicts that misconfigurations will cause 99% of all firewall breaches this year. It’s […]
Read MoreHow generative AI will enhance cybersecurity in a zero-trust world
Are you ready to bring more awareness to your brand? Consider becoming a sponsor for The AI Impact Tour. Learn more about the opportunities here. CISOs and CIOs continue to weigh the benefits of deploying generative AI as a continuous learning engine that constantly captures behavioral, telemetry, intrusion and breach data versus the risks it […]
Read MoreVentureBeat’s Special Issues: Exclusive deep dives into Gen AI and other transformative tech
We’re thrilled to announce the return of GamesBeat Next, hosted in San Francisco this October, where we will explore the theme of “Playing the Edge.” Apply to speak here and learn more about sponsorship opportunities here. At the event, we will also announce 25 top game startups as the 2024 Game Changers. Apply or nominate today! At the […]
Read MoreWhy CISOs need zero trust as a ransomware shield
This year is on pace to be the second-costliest for ransomware attacks ever, with threat actors relying on new deceptive approaches to social engineering combined with weaponized AI. The recent MGM breach began with attackers studying the social media profiles of help desk employees, then calling the help desk and impersonating them to get privileged […]
Read More