Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

Cloud Unfiltered with David Aronchick - AI, Kubeflow, and CoD - Episode 2

In this episode of Cloud Unfiltered, host Michael Chenetz interviews David Aronchick, co-founder of Kubeflow and leader of a new startup, Expanso. They dive into David's unique journey as a tech innovator, detailing his significant contributions to Kubernetes at Google and his ventures in the startup world. They explore the challenges of reproducibility in technology, the evolution of Kubernetes, and the future of AI and machine learning, including the significance of Kubeflow and Expand in simplifying and advancing cloud and AI technologies.

How Can Continuous Asset Monitoring Protect Critical Assets?

The increase in cyberattacks increases year-on-year with attacks being more and more sophisticated. It’s a daunting task for security teams to adapt security strategies to proactively mitigate threats against the backdrop of a shortage of cybersecurity talent and budgets stretched. This is leading to organisations adopting proactive defence strategies using tools with continuous monitoring capabilities.

EU AI Act Developments and More - This Month in AI

In a historic move, European Union member countries have unanimously agreed on the groundbreaking Artificial Intelligence Act. This achievement comes after overcoming last-minute concerns that the rulebook might impede European innovation. The EU deputy ambassadors provided the green light to the final compromise text, marking the conclusion of extensive negotiations between the Council, European Parliament members, and European Commission officials.

Weekly Cybersecurity Recap February 16

This week was particularly active in Cybersecurity—attacks rained upon all states, from the Great Basin of Nevada to the Volcanoes of Hawaii. The week began with an announcement out of Texas: U.S. Renal Care found exposed information from a vendor breach in 2023, impacting over 132k patients. Connecticut College was also featured this week; investigations are ongoing, but victims shouldn’t wait to protect themselves. The public also got an update on the PJ&A data breach from 2023.

What Is a Passkey Manager?

A passkey manager is a tool that aids users in generating, storing and managing the passkeys they use to log in to their accounts. There are many types of passkey managers available on the market, including ones that come built into your devices, browser-based passkey managers and dedicated passkey managers that allow you to access your passkeys from anywhere. Continue reading to learn more about what passkey managers are and why you should use them to store your passkeys.

462k Hawaiians and Patients Exposed by Health Network Cyberattack

Navvis & Company is a comprehensive healthcare network throughout the US, including Hawaii. They offer scalable healthcare services that push patients towards their health and wellness goals while supporting providers’ roles to achieve those milestones. In the middle of last year, mid-July, Navvis experienced a cyberattack; their experts responded, but not before the assailants got away with 462,861 records—and that’s just from Hawaii.

Data Insecurity: Building Resilience in the Face of Cyber Threats

In today's digital age, organizations are using data in innovative ways to understand their businesses and generate new value, making data the lifeblood of every operation. As a result, data is growing at an unprecedented rate across on-premises, SaaS, and multi-cloud environments. However, this rapid growth presents significant challenges for organizations, as they often struggle to identify sensitive or regulated data, where it’s located, and who has access to it.

Augmented Security: The Impact of AR on Cybersecurity

Recently, Apple launched its Apple Vision Pro to much fanfare and has pushed the discussion of Augmented Reality (AR) beyond the realms of gaming and entertainment. From healthcare innovations to retail experiences and manufacturing enhancements, AR has the potential to reshape operational frameworks and redefine user interactions. Yet, as we pivot towards exploring the symbiotic relationship between AR and cybersecurity, we're opening Pandora's box to a new dimension of cyber threats.

Messaging Platform Telegram Sprouts Cyber Crime "Marketplaces" of Tools, Insights and Data

Cybercriminals are taking advantage of the messaging platform Telegram by creating channels and groups where learning and commerce all can take place freely. We’ve long known the dark web to be the back shadowed corner of the Internet where cybercriminals go to do business. But we’ve seen more examples of marketplaces frequented by threat actors shifting to the open web. One of the latest is the continued misuse of messaging platform Telegram.