Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Friction between DevOps and Security - Here's Why it Can't be Ignored

Note: This post is co-authored by JFrog and Sean Wright and has also been published on Sean Wright’s blog. DevOps engineers and Security professionals are passionate about their responsibilities, with the first mostly dedicated to ensuring the fast release and the latter responsible for the security of their company’s software applications.

Securing AI with Least Privilege

In the rapidly evolving AI landscape, the principle of least privilege is a crucial security and compliance consideration. Least privilege dictates that any entity—user or system—should have only the minimum level of access permissions necessary to perform its intended functions. This principle is especially vital when it comes to AI models, as it applies to both the training and inference phases.

Introducing Salt Security's New AI-Powered Knowledge Base Assistant: Pepper!

Going to a vendor's Knowledge Base (KB) is often the first place practitioners go to get the product deployed or troubleshoot issues. Even with advanced search tools, historically, KBs have been challenging to find relevant content quickly, and navigating a KB can be frustrating. At Salt Security, not only do we want to make your job of securing APIs easier, but we also want to make getting the guidance you need easier, friendlier and more efficient.

A Cyber-defenders Guide to Recognizing Cyber Threats

According to Cybersecurity Ventures, the cost of cybercrime is expected to surge by 15 percent annually over the next five years, soaring to a staggering $10.5 trillion annually by 2025, up from $3 trillion in 2015. This exponential growth underscores the urgent need for a comprehensive understanding and proactive defense against the myriad of cyber threats looming on the horizon.

What You Need to Know About Hugging Face

The risk both to and from AI models is a topic so hot it’s left the confines of security conferences and now dominates the headlines of major news sites. Indeed, the deluge of frightening hypotheticals can make AI feel like we are navigating an entirely new frontier with no compass. And to be sure, AI poses a lot of unique challenges to security, but remember: Both the media and AI companies have a vested interest in upping the fright hype to keep people talking.

EP 49 - Secure Browsing and Session-Based Threats

In this episode of Trust Issues, David welcomes back Shay Nahari, VP of CyberArk Red Team Services, to discuss the topic of secure browsing and session-based threats. They delve into the dangers of cookie theft, the expanding attack surface, and the importance of identity security. Shay explains how cookies sit post-authentication and how attackers can bypass the entire authentication process by stealing them.

Navigating the Deepfake Landscape: Understanding, Detecting, and Preventing Deception

Artificial intelligence (AI) is swiftly reshaping our reality, sparking innovation across diverse domains. Yet, amid this advancement lies a pressing issue: deepfakes. These ultra-authentic synthetic media pieces can alter videos or audio to fabricate instances where individuals seem to say or do things they never actually did.