Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Truth About How Generative AI Can Be Used In Cybersecurity

Thanks to ChatGPT, you’ve probably heard a lot about generative AI technology over the last few years. Generative AI is artificial intelligence technology that works by taking input data like a request, processing it through different algorithms, and producing an output based on learned patterns. ChatGPT is a generative AI chatbot. 91% of security teams use generative AI, but 65% don’t fully understand the implications.

AT&T Data Breach 2024 Lawsuit: Consumer Reactions and Future Implications

AT&T had a big data breach in early 2024, which let millions of customer records with private and sensitive information become public. People were scared by this event, and it also made people question AT&T's data protection policies. The AT&T Data Breach Lawsuit was started because of this, with customers asking for money and information about the company's safety measures. A lot of people are worried about this case, which shows how vulnerable businesses are in the current scenario.

Best Practices for Writing an IT Security Incident Report

Everyone remembers that one required writing class they needed to take. If you’re like a lot of other security analysts, you assumed that your job would focus on using technology, not writing research papers. However, in today’s business environment, cyber incidents are critical business events, especially as governments and agencies create more reporting requirements.

Mobile Endpoint Security: Why Enhancing EDR for Mobile is Critical

Do you know how secure your organization’s mobile devices are? You may have a handle on your on-premises device and network security, but the rise of remote employee access and bring-your-own-device (BYOD) policies has created new security challenges. Many organizations rely on endpoint detection and response (EDR) solutions to keep their traditional endpoints secure, but these solutions often don’t prioritize mobile endpoint security.

EP 65 - Machine Identities, AI and the Future of Security with the 'Identity Jedi'

In this episode of the Trust Issues podcast, host David Puner and David Lee, aka “The Identity Jedi,” delve into the evolving landscape of identity security. They discuss the critical challenges and advancements in securing both human and machine identities. Lee shares insights on the fear and misconceptions surrounding AI, drawing parallels to pop culture references like Marvel’s Jarvis.

The 7 Essential Steps for Ensuring Mobile App Security

Mobile devices now account for more than half of all web traffic, and that number seems poised to increase over the next few years. Between the Apple App Store and Google Play Store, there are already more than 5 million applications available — and not all of them are safe. A smart mobile app security strategy can mitigate some of the threats that come from unauthorized, misconfigured, or malicious software.

What To Do if Someone Stole Your Child's Identity

While having your own identity stolen is stressful and scary, you will likely be even more terrified if someone steals your child’s identity. Child identity theft occurs when someone steals a minor’s private information to open lines of credit, obtain loans or claim benefits in a child’s name. Based on data from Safe Home, 73% of child identity theft victims know the person who stole their identity, so it’s important to teach children strong online practices.

Workforce security redefined: Persona and Okta partner to verify identities and protect against phishing and deepfakes

Enforce identity verification throughout the employee life cycle using Persona and Okta’s out-of-the-box integration for identity verification. Joshua Rodriguez is a product marketing manager at Persona focused on our Graph product and financial institution and public sector verticals. You'll find him around the Bay Area exploring museums with his wife and young daughter.