Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

AI Risks (& the Race to Manage Them)

Great innovations bring great risks — including artificial intelligence. You may be aware of the cutting-edge capabilities, but have you considered the risks of AI? A few weeks ago, my colleague wrote on the dangers of ChatGPT, focusing on the risk of adding third parties to your ecosystem. Since then, things have only gotten worse.

Countless Medical Patients Get Exposed in Shields Healthcare Group Data Breach

Shields Healthcare Group is a technologically advanced health service provider that works with independent and large medical providers. The company manages health data, offers online services, and works to help medical providers keep their information secure and organized. This large-scale provider recently experienced a data breach that left them in a dangerous situation that could put countless patients at risk.

Root Cause Analysis for Deployment Failures

Root Cause Analysis (RCA) is a technique used to identify the underlying reasons for a problem, with the aim of trying to prevent it from recurring in the future. It is often used in change management processes to help identify the source of any issues that arise following any modifications to a system or process. RCA is something Tripwire Enterprise is often deeply tied into too.

Cloud security 101: Understanding and defending your cloud infrastructure

Many organizations have either been formed in, or have migrated to cloud-based environments due to the efficiency, flexibility, mobility, cost savings, and other benefits. The majority of applications that are used today are incorporated with the cloud. Most of our data and processes exist in the cloud. But simple as it is, just uploading your files to the cloud or using services of the cloud, doesn`t guarantee that it`s secure.

What Australian Tech and IT Leaders Want to See in Australia's Cybersecurity Strategy

I think we can all agree that the Australian government has demonstrated its will to empower our country, its organisations and citizens to be more secure online. Australia has become a prime target for bad actors, and like my counterparts, I appreciate a government with a hands-on approach—one that recognises the criticality of cybersecurity.

Why is Cybersecurity Now a Global Governmental Concern?

Governments everywhere are increasingly concerned about implementing frameworks to improve the protection of personal and commercial information and defend national security against cyberattacks. I was recently in Australia, and it was hard to ignore the news that the Australian government released a discussion paper to shape its work on its 2023 – 2030 cybersecurity strategy.