Tag: Security

Why SASE will benefit from faster consolidation of networking and security

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More Seventy-five percent of enterprises are pursuing vendor consolidation, up from 29% just three years ago, with secure access service edge (SASE) experiencing significant upside growth as a result. SASE is also proving […]

Read More

Microsoft Security Copilot uses GPT-4 to help security teams move at AI speed

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More Cybersecurity is a game where speed kills. Defenders need to act fast if they want to keep up with sophisticated modern threat actors, which is difficult when attempting to secure data as […]

Read More

GPT-4 kicks AI security risks into higher gear

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More As Arthur C. Clarke once put it, any sufficiently advanced technology is “indistinguishable from magic.” Some might say this is true of ChatGPT, too — including, if you will, black magic.  Immediately […]

Read More

How to prepare for a world without passwords

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More Businesses are spending billions of dollars each year on cybersecurity solutions, but we’re still seeing a steady increase in security breaches. We hear about high-profile cases, but for every breach that makes […]

Read More

How shift left security and DevSecOps can protect the software supply chain  

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More Security shouldn’t be an afterthought. Releasing code filled with exploits and bugs is a recipe for disaster. This is why more and more organizations are looking to shift security left — to […]

Read More

Diffusion models can be contaminated with backdoors, study finds

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More The past year has seen growing interest in generative artificial intelligence (AI) — deep learning models that can produce all kinds of content, including text, images, sounds (and soon videos). But like […]

Read More

Hacker demonstrates security flaws in GPT-4 just one day after launch

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More OpenAI’s powerful new language model, GPT-4, was barely out of the gates when a student uncovered vulnerabilities that could be exploited for malicious ends. The discovery is a stark reminder of the […]

Read More

The right corporate structure is key to balancing risk and user experience

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More Savvy organizations recognize that the faster you can service customers, the happier they will be. That typically goes hand in hand with savings in operational costs. But due to fraud, connecting with […]

Read More

Analysts share 8 ChatGPT security predictions for 2023 

The release of ChatGPT-4 last week shook the world, but the jury is still out on what it means for the data security landscape. On one side of the coin, generating malware and ransomware is easier than ever before. On the other, there are a range of new defensive use cases.  Recently, VentureBeat spoke to […]

Read More

4 key trends from the Gartner IAM Summit 2023

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More Identity is the new network perimeter. In a world powered by cloud computing, every human and machine identity, whether it exists on-premises or in the cloud, needs to be protected to prevent […]

Read More

A roadmap to zero-trust maturity: 6 key insights from Forrester

Once an enterprise decides to go all-in on zero trust, it usually starts strong, only to hit barriers no one saw coming. This makes a roadmap essential. Seeing its clients who are pursuing zero trust facing challenges in reaching the next level of maturity, Forrester invested a year of its zero trust team’s time in […]

Read More

Splunk updates Observability Cloud, rolls out edge data stream processor

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More San Francisco-headquartered Splunk, which provides enterprises with a unified security and observability platform, today announced incremental updates to its core offering. The release, focusing on Splunk Observability Cloud and Mission Control, marks […]

Read More

Oleria raises $8M to make multi-factor authentication adaptive

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More Most organizations’ identity and access management strategy has a long way to go. According to Gartner, by 2026, 70% of identity-first security strategies will fail unless organizations adopt context-based access policies that […]

Read More

Defining endpoint security in a zero-trust world

Attackers strike at businesses with identity theft as their top goal. CISOs and CIOs told VentureBeat they’ve seen spikes in identity-driven attacks in the first three months of 2023.  Getting identity right is core to a robust zero-trust framework. It takes endpoint resilience, improved sensing and telemetry data analysis techniques, and faster innovation at protecting […]

Read More

Twitter’s fraud problem isn’t too hard to solve

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More With every element of Elon Musk’s takeover of Twitter under constant scrutiny, there has been no shortage of headlines involving the social media giant over the last few months. Twitter has had […]

Read More

Innovating during a regulatory wave

American financial institutions are already facing an incredibly complex regulatory environment. What’s coming will only make matters more challenging. Why? A convergence of emerging policy priorities in Washington is creating a raft of new compliance risks. This trend can have increasingly negative impacts on industry innovation by directing time and resources that could instead be […]

Read More

How security access service edge (SASE) can improve performance and security for hybrid workforces

Today’s business environments are more sprawled than ever — users are accessing networks from point A to point B and everywhere in between.  This has left many cybersecurity teams scrambling to cover all network points and users and ensure that gaps and silos don’t provide easy pathways for threat actors.  The broadened physical and virtual […]

Read More

How access management helps protect identities in the cloud

Things are rapidly growing more challenging on the security front in 2023. Many CISOs didn’t expect this much pressure to consolidate tech stacks, make budgets go further and do better at stopping identity-driven breach attempts. CISOs tell VentureBeat that access management (AM), identity and access management (IAM) and privileged access management (PAM) are under attack […]

Read More

A zero-trust roadmap for cybersecurity in manufacturing — from a 98-year-old company

Manufacturers are the most popular corporate targets for ransomware attacks and identity and data theft. With customer orders and deliveries hanging in the balance, they can only afford to have their product lines down for a short time. So attackers know that if they can disrupt manufacturing operations, they can force a high ransom payout.  […]

Read More

How ChatGPT can become a security expert’s copilot 

With ChatGPT-4 released this week, security teams have been left to speculate over the impact that generative AI will have on the threat landscape. While many now know that GPT-3 can be used to generate malware and ransomware code, GPT-4 is 571X more powerful, creating the potential for a significant uptick in threats. However, while […]

Read More

Forget the hybrid cloud; it’s time for the confidential cloud 

As cloud adoption gains traction, it’s clear that security teams have been left to play catch up. In diverse hybrid cloud and multicloud environments, encrypting data-at-rest and in-transit isn’t enough; it needs to be encrypted in use, too. This is where confidential computing comes in.  Today, The Open Confidential Computing Conference (OC3) gathered together IT […]

Read More

CrowdStrike report shows identities under siege, cloud data theft up

Cyberattacks exploiting gaps in cloud infrastructure — to steal credentials, identities and data — skyrocketed in 2022, growing 95%, with cases involving “cloud-conscious” threat actors tripling year-over-year. That’s according to CrowdStrike’s 2023 Global Threat Report. The report finds bad actors moving away from deactivation of antivirus and firewall technologies, and from log-tampering efforts, seeking instead […]

Read More

Cloud incident response nets another $45M with Mitiga’s latest funding  

Cloud adoption is on the rise. Just last year, 89% of enterprises migrated data from on-premise storage to the public cloud. And, 84% of organizations expect to increase the amount of data they store in the public cloud in 2023.  This is great news for decision makers. But for security teams, the growing use of […]

Read More

Report: Hackers leaked over 721 million passwords in 2022 

There’s no simpler way to hack someone’s account than to enter their username and password. In fact, threat actors routinely leak users’ login credentials on the dark web, where they can be purchased by cybercriminals and fraudsters to commit further crimes. According to research released today by Cybercrime Analytics (C2A) provider SpyCloud, researchers discovered 721.5 […]

Read More

Security risks threaten the benefits of the edge

Edge compute is touted for its ultra-low latency and high efficiency.  But it also presents a new attack surface can that bad actors can use to compromise data confidentiality, app integrity and service availability.  “What else is also getting distributed? The attacks,” said Richard Yew, senior director of product management for security at Edgio. Ultimately, […]

Read More

Multifactor authentication: Keeping employee data secure through digital ID management

Digital security is a growing concern for business owners. We live in a post-pandemic era defined by data breaches and online threats that have only increased as everyone has adjusted to a remote-first work world. As digital threats continue to ramp up, you must take a proactive stance to keep your company’s data secure — […]

Read More

The challenges of attracting cybersecurity talent and how to address them

The cybersecurity industry is at an interesting inflection point. We are now approaching three years of remote and hybrid work, and individuals and organizations alike have had to adjust and improve their security infrastructures. And this push for more security will only amplify in 2023 in new and unique ways. Despite the growing need for […]

Read More

What is confidential computing exactly? Fortanix CEO explains 

When it comes to data encryption, confidential computing is one of the fast-growing solutions in the enterprise market.  In fact, Everest Group predicts that the confidential computing market could grow to $54 billion by 2026, with vendors ranging from Microsoft, Intel and AMD all using the technology to help organizations protect their critical data assets. […]

Read More

5 steps to gain control of vulnerability management for your enterprise

Over the last decade, organizations have significantly scaled up their business processes. They’ve increased the amount of technology they use, the size of their teams spinning up new systems, and the number of assets they have created. However, as businesses themselves have accelerated, their vulnerability management systems have been left in the dust. Businesses must […]

Read More

Cryptocurrency is fueling the ransomware boom. Here’s how to protect yourself

Cryptocurrency was once positioned as a future alternative to traditional fiat money — a decentralized, digital currency that marked the next big step in the digitalization of the world.  But today, the single biggest practical use for cryptocurrency is as a money laundering vehicle for cybercriminals. This fact has helped fuel a ransomware boom that […]

Read More