Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What New Security Threats Arise from The Boom in AI and LLMs?

Generative AI and large language models (LLMs) seem to have burst onto the scene like a supernova. LLMs are machine learning models that are trained using enormous amounts of data to understand and generate human language. LLMs like ChatGPT and Bard have made a far wider audience aware of generative AI technology. Understandably, organizations that want to sharpen their competitive edge are keen to get on the bandwagon and harness the power of AI and LLMs.

Microsoft Threat Protection Specialisation

As you may have seen in the press earlier this year, Stripe OLT recently achieved two crucial Microsoft certifications, in both Modern Work and Security. These certifications (also known as designations) are important to Microsoft solution partners because they signify a deep understanding and proficiency of specific Microsoft technologies.

The Rise of Generative AI in Citizen Development (and Cybersecurity Challenges That Come With It)

Citizen developers, often without a formal background in programming, are harnessing the power of generative AI capabilities to create powerful business applications and automations in low-code/no-code platforms like Microsoft Power Platform, Salesforce, and ServiceNow. While this democratization of software development brings about numerous benefits, it also introduces a host of new cybersecurity risks that organizations must address to safeguard their sensitive data and maintain compliance standards.

What are the keys to retaining top talent in cybersecurity?

This is a continuation of my interview with Scott Scheppers, chief experience officer for AT&T Cybersecurity, on the cybersecurity talent shortage. Scheppers points out that organizations have to pay attention to compensation when it comes to talent retention. “Good pay - don’t discount that. You need to be competitive and compensate people well, but that’s not the only thing that matters.”

Build Audit Trails With Dropbox and DataTrails

DataTrails enables compliance and audit teams to eliminate the time-wasting and error-prone processes with our new solution. With the introduction of our Dropbox connector, there is a no-code solution that provides notarized evidence of your file’s metadata. Now you can capture legally admissible proof for your business with just a few clicks. To get started, set-up a free DataTrails account and connect it to Dropbox by following these instructions.

9 Tips to Prevent Eavesdropping Attacks in Your Organization

Businesses today leverage technology in almost all aspects of their operations because it enhances efficiency. However, this reliance on digital tools exposes them to cyber threats like an eavesdropping attack. Research says more than 37% of smartphones worldwide have become eavesdropping targets. That's a lot of mobile devices belonging to employees of many companies. So, understanding what an eavesdropping attack is and how to prevent it can save your organization from potential problems.

Cato Networks Takes a Bite of the Big Apple

My new favorite company took center stage in iconic New York Times Square today with a multi-story high 3D visualization of our revolutionary secure access service edge (SASE) platform. It’s positively mesmerizing, take a look: The move signals a seismic shift happening across enterprises, the need to have an IT infrastructure that can easily adapt to anything at any time, and the transformative power of Cato’s networking and security platform.