Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Windows Downdate Attacks, Quick Share Vulnerability Exploit, and More: Hacker's Playbook Threat Coverage Round-up: August 2024

In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting attack coverage for several new threats, including those discovered via original research by the SafeBreach Labs team. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s Playbook to ensure coverage against these advanced threats. Additional details about the threats and our coverage can be seen below.

Ace Your Back-to-School Season with Threat Intelligence

As the school year officially kicks off, students everywhere are hitting the books. But it’s also time for IT and security teams as well as administrators to get up to speed on the latest cyber threats that may impact their environment. The education sector is a treasure trove of valuable data – from financial and sensitive personal information to intellectual property and raw research data – which makes it an attractive target for threat actors.

The EU AI Act: A roadmap for trustworthy AI

As artificial intelligence (AI) continues to revolutionize various sectors, ensuring it is developed and deployed in alignment with ethical standards and fundamental rights is critical for businesses that use it. The European Union's Artificial Intelligence Act (AI Act), formally adopted on March 13, 2024, addresses this critical necessity by establishing a comprehensive and detailed legal framework for AI systems within the EU.

Protecting Patient Safety: Trustwave's Role in Healthcare Cybersecurity

The healthcare industry's digital transformation has brought unprecedented advancements in patient care. However, it has also introduced new vulnerabilities that put sensitive patient data at risk. Cybersecurity is no longer an option but a critical component of delivering safe and effective care. Threat actors have no compunction about taking advantage of this increased threat surface.

"Better context in a world that's changing quickly": Leading CISOs discuss AI's role in SecOps

Earlier this month, I was thrilled to join forces with the team at Dark Reading for a webinar on the future of AI in security operations. Titled CISO Perspectives: How to make AI an accelerator, not a blocker, the webinar allowed me to take a deep dive into the future role of AI in security with some of the most knowledgeable CISOs on the subject, Mandy Andress of Elastic and Matt Hillary of Drata.

Understanding Data Exfiltration Prevention

In an economy where securing data can mean the difference between success and failure, implementing proven data exfiltration prevention strategies is more critical than ever. According to a study conducted by IBM, a data breach can cost global organizations an average of nearly $5 million per incident. In addition to the financial ramifications, data theft can lead to lower customer trust, a loss of future revenue, and even potential lawsuits.

The Impact of AI and Machine Learning on Cloud Data Protection

The momentous rise of AI continues, and more and more customers are demanding concrete results from these early implementations. The time has come for tech companies to prove what AI can do beyond adding conversational chat agents to website sidebars. Fortunately, it’s easy to see how cloud data protection has already benefited from advancements in AI and ML. Headline-grabbing large-language models are also making protecting data in the cloud easier to manage across organizations. ‍

Building a Resilient Supply Chain in the Face of Cyber Threats

Supply chain resilience has never been more critical. Recent cyber outages have underscored a harsh reality—supply chains are vulnerable, and disruptions can have far-reaching impacts. But what does it mean to be supply chain resilient, especially in the context of cyber threats? In this post, we will explore lessons learned from recent cyber outages, offering actionable insights for enhancing supply chain resilience.

Life in Cybersecurity: Expert Tips and Insights from a Cybersecurity Recruiter

One of the most challenging aspects of working in cybersecurity can be the deceptively simple act of finding the best job that suits your skillset and best fits the employer's expectations. Whether it is an entry-level position, a lateral move, or a career advancement, there is more to finding a rewarding position than just relying on the heavily publicized skills shortage.