Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

Unlocking the Power of Multimodal AI: What is Multimodal Retrieval Augmented Generation?

In the rapidly maturing landscape of artificial intelligence (AI), multimodal learning has emerged as a game-changer. It enables AI systems to process and integrate data from numerous modalities, such as text, images, audio, and video. This approach is crucial for developing AI systems that can understand and interact with the world in a more human-like manner, as our experiences and communication are inherently multimodal.

Top 6 Data Breaches That Cost Millions

“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there’s a key hidden somewhere, they won’t stop until they find it.” - Tim Cook, CEO of Apple Inc. The entire digital landscape has evolved into a behemoth of sorts as the number of online attacks targeting individuals, businesses, and governments has risen steadily.

Safeguard Your Business Data with BDRSuite on World Backup Day

As the digital age advances, safeguarding your data becomes more crucial for all businesses than before. But what happens when that data is suddenly lost, whether due to a hardware failure, theft, or malware attack? The consequences can result in heavy loss. That’s why World Backup Day, observed on March 31st, serves as a timely reminder to protect your valuable business data.

Advanced Security: Marking AWS WAF's Homework

The same security scenarios are checked thoroughly. Privilege escalation, SQL injection, Port scanning and so on. These checks form the bedrock of defensive security, but as solutions become more complex, so too must our capability to detect complex scenarios. Let’s explore a very complex use case, that ties together multiple Coralogix features, and showcases the power of Coralogix, not just in detecting the simple stuff, but in tracking the most complex scenarios in modern security.

Who You Gonna Call? For Incident Response

Globally, no organization is immune to attack. Cybersecurity threats are a reality and every organization, anywhere in the world, is a potential target, regardless of location or size. It’s not a question of if, but when an incident will affect your organization. Do you know who you will call for assistance?

Protecting Customer Data: Key Principles Every Company Should Know

In the digital age, protecting customer data is a cornerstone of trust and reliability between a company and its consumers. As cyber threats loom larger and data breaches become more frequent, safeguarding sensitive information cannot be ignored. Companies that excel in data protection comply with stringent regulations and gain a competitive edge by building solid relationships with their customers.

UpGuard Summit March 2024 Recap: Scaling Your TPRM Program

In mid-March, UpGuard welcomed security professionals from APAC, EMEA, India, and the U.S. to participate in the first UpGuard Summit of 2024. This quarter’s event focused on third-party risk management (TPRM), specifically addressing how organizations can scale their TPRM programs to meet their evolving needs and defend their growing attack surfaces.

Veracode Customers Shielded from NVD Disruptions

The US National Institute of Standards and Technology (NIST) has almost completely stopped analyzing new vulnerabilities (CVEs) listed in its National Vulnerability Database (NVD). Through the first six weeks of 2024, NIST analyzed over 3,500 CVEs with only 34 CVEs awaiting analysis.1 Since February 13th, however, nearly half (48%) of the 7,200 CVEs received this year by the NVD are still awaiting analysis.2 The number of CVEs analyzed has dropped nearly 80% to less than 750 CVEs analyzed.

Securing your SBOM on Google Cloud

Over the past few years, software supply chain security has been top of mind for governments and businesses alike. Following Log4Shell in late 2021, the Biden administration’s National Cybersecurity Strategy started focusing on open source supply chain security. The National Security Agency (NSA) recently released new guidance on securing open source software supply chains.

The top 10 cybersecurity threats in 2024

In 2023, cyber threats increased and diversified, resulting in increased security challenges for organizations around the globe. Meanwhile, AI greatly increased its presence in the realm of cybersecurity, both negatively and positively. 2024 is going to be a year in which advanced AI tools and complex social engineering tactics will further alter the cybersecurity game. In this article, we will focus on the most important cybersecurity threats in 2024.