Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Introducing Tines Workbench

You trust us with your most important workflows, and we take that trust seriously. In developing AI in Tines, we’ve been laser-focused on helping users leverage AI without exposing their organizations to security and privacy risks. But we also spoke with so many teams struggling to fully realize AI's potential impact. They wanted AI to do more, while still preserving those all-important security and privacy guardrails.

7 Examples of How AI in Data Security is Transforming Cybersecurity

AI in data security transforms how organizations protect sensitive information. Companies turn to artificial intelligence for robust defense mechanisms as cyber threats evolve. This cutting-edge technology analyzes vast datasets, identifies patterns, and responds to threats in real-time, surpassing human capabilities. From small businesses to large enterprises, AI-powered solutions guard against increasingly sophisticated attacks.

How to mitigate security issues in GenAI code and LLM integrations

GitHub Copilot and other AI coding tools have transformed how we write code and promise a leap in developer productivity. But they also introduce new security risks. If your codebase has existing security issues, AI-generated code can replicate and amplify these vulnerabilities.

How to Marry Customer Communication Tools with AI to Enhance Customer Support

For companies, customer service plays a critical role in retaining customers and driving growth. Studies show that 93% of customers are likely to make repeat purchases from companies that provide excellent customer service. To succeed in today's competitive business environment and meet ever-increasing customer expectations, more and more companies are considering integrating artificial intelligence with customer communication tools, which include software that interacts with customers across multiple channels, such as email, free live chat, and social media. In the article, we will explore how marrying customer communication tools with AI can revolutionize the way companies interact with their customers, and list the benefits a company can reap by doing so.

Zero Trust + AI: fewer alerts, guaranteed security

Excessive cybersecurity alerts are not a trivial matter; they pose a real challenge that directly impacts business security strategies. Too many notifications generate stress on IT teams, which are increasingly being reduced in size while facing a heavier burden of tasks. This situation can lead to urgent alerts being overlooked, putting system security at risk.

Billington 2024: Key Cybersecurity Takeaways from the AI Age

SecurityScorecard had the pleasure of participating in the 15th Annual Billington CyberSecurity Conference – a key convening of policymakers and industry thought leaders in our Nation’s Capital. This year’s edition – Advancing Cybersecurity in the AI Age – included over 4,000 registrants and 200 speakers participating in 40+ sessions and breakouts. It would not be an emerging tech and government conference without an extra emphasis on AI.

It's Time to Press Play on the AI Pause: Data Security Insights for a New Era

This past summer was the first time I watched the Olympics since moving to the U.S. Besides appreciating the sheer greatness of the American Olympic spirit, there was also another thing that could not go missed - AI! Filling up every commercial slot seemed to be AI. And mainly, the commercials focused on harnessing AI for business productivity and operations. No matter your take on the greatest Olympic moment or greatest AI commercial, one could not overlook this overwhelming trend.

What is PII Masking and How Can You Keep Customer Data Confidential

Personally Identifiable Information (PII) refers to any data that can identify an individual. In today’s digital world, protecting PII is crucial. As data breaches become more common, businesses must protect their sensitive information. PII masking plays a vital role in data security. It involves altering or hiding specific data elements to prevent unauthorized access. This practice is essential for companies that handle large volumes of customer data.