Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How a Network Digital Twin Prevents Change-Related Outages

In today's rapidly evolving IT landscape, effective change management is crucial for maintaining network stability and performance, but many organizations lack a consistent change process. Lack of process often leads to unintended consequences, such as outages and performance degradation. A network digital twin offers a transformative solution to these challenges by streamlining change management processes and providing pre- and post-change verification to enhance operational efficiency.

Streamline Vendor Risk Management with the New Riscosity and ServiceNow Integration

Today, we’re excited to announce the launch of our integration with the ServiceNow Vendor Response Management (VRM) offering. Riscosity’s integration with ServiceNow empowers security teams with the insights and tools needed to achieve their security goals while still using their existing workflows in ServiceNow VRM.

Comprehensive, Continuous, and Compliant: Obtain Proactive Insights with Splunk Asset and Risk Intelligence

The Splunk team is excited to announce the release of the latest addition to our security product portfolio, Splunk Asset and Risk Intelligence (ARI). The modern digital landscape is a complex mix of devices, users, and a wide array of products and applications, all spread across on-prem, cloud, and hybrid environments.

NEW in Elastic Security 8.15: Automatic Import, Gemini models, and AI Assistant APIs

Elastic Security 8.15 is now available, enhancing our mission to modernize security operations with AI-driven security analytics. Key features include the brand new Automatic Import to streamline data ingestion and onboarding, support for Google’s Gemini 1.5 Pro and Flash large language models (LLMs), a new set of APIs for the Elastic AI Assistant, on-demand file scans for the Elastic Defend integration, and a redesigned way of pivoting between different contexts.

New NIST Zero Trust Guidance Reinforces Agent Hygiene Value

This week, the National Institute for Standards and Technology (NIST) released “Implementing a Zero Trust Architecture (NIST SP 1800-35)” for public comment. The guide is written by NIST’s National Cybersecurity Center of Excellence (NCCoE) in collaboration with 24 cybersecurity companies. Now in its fourth draft, NCCoE has opened up comments for this Zero Trust Architecture (ZTA) guide through Sept. 30, 2024, as part of a 60-day review cycle.

Over $40 Million Recovered and Arrests Made Within Days After Firm Discovers Business Email Compromise Scam

According to the FBI, billions of dollars have been lost through Business Email Compromise (BEC) attacks in recent years, so you may well think that there is little in the way of good news. However, it has been revealed this week that police managed to recover more than US $40 million snatched in a recent BEC heist just two days after being told about it.

A security expert's view on Gartner's generative AI insights - Part 2

Welcome to the second part of our two-part special on Gartner’s “4 Ways Generative AI Will Impact CISOs and Their Teams” report! If you’ve missed the first part on model composition, you can read it here. Today, we will explore why security specialism matters in an AI security tool, particularly where AI quality is concerned.

Evolution of Scalper Bots Part 1: Origins of Scalping

In the evolving landscape of online ticketing and eCommerce, few technological developments have been as controversial as scalper bots. These automated programs, designed to purchase high-demand items faster and more efficiently than humans could, have transformed the way we buy and sell coveted goods online. During this forthcoming blog series, we are going to explore the fascinating evolution of scalper bots. We will trace their origins, developments, and impacts across several distinct eras.