Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Understanding Prompt Injection: A Growing Concern in AI and LLM

Artificial Intelligence (AI) and Large Language Models (LLM) have revolutionized numerous industries, from healthcare to finance. However, with this rapid adoption comes new risks, one of which is prompt injection. This emerging threat has significant implications for the security, ethics, and reliability of AI systems.

How to setup PGP Keys for Encrypted Email

In today's world, electronic mails (e-mails) serve as a medium of both official and personal correspondence. With sensitive information being shared online, it's essential to secure your emails. Pretty Good Privacy (PGP), a robust encryption program, offers a reliable solution for securing the contents of your emails. Developed by Phil Zimmermann in 1991, PGP utilizes public-key cryptography to ensure both confidentiality and authenticity in email exchanges.

Shadow APIs vs Zombie APIs - All You Need to Know

In the age of digital-first businesses, every other software solution either uses an API (Application Programming Interface) or makes one. They enable various applications and services to work together, enabling businesses to improve features, streamline user experience, and provide new exciting offerings. Unfortunately, the more APIs we collect and interact with, the more security challenges increase.

Tines Idea: Simplify Security Alerts with AI in Tines

From transforming data with a prompt and generated code, to directly accessing and using a language model in your workflows, our AI features make automation even more accessible and efficient for anyone in your organization. Learn how you can take multi-source security alert workflows from 25 actions to 3, reducing the potential for error and making it simpler to make updates like adding sources, change rule definitions, and more.

It's Time for SIEM to Act Like a Security Data Platform

What you’re doing isn’t working. Despite best efforts, the scale of cybersecurity data is outpacing the ability of security information and event management (SIEM) solutions to identify and stay ahead of digital threats. Incremental improvements can’t keep pace with the scale of data contained in cloud solutions and the scope of data created by new tools, like generative AI. The result? It’s time for transformation—and time for SIEM to act like a security data platform.

Updates to the CRQ Platform: ISO 27001 Mapping and Model Calibration

‍ ‍ ‍One of the most simultaneously exciting and challenging aspects of working in the cybersecurity industry is that the risk landscape and management practices never stop evolving. Additional data is continuously being gathered, and new frameworks are constantly developed to help organizations better assess, measure, and secure themselves against threat actors poised to exploit system weaknesses.

Data Modernization: The Evolution of Data Sharing

Primitive information sharing has greatly evolved, creating a kaleidoscope of various ways we communicate and share information, both publicly and privately. This change in data ecosystems affects you – data owners responsible for how data is distributed, protected, and accessed hold sensitive data in the palms of their hands. As we continue to evolve, data protection should be in the center of any business strategy, and relying on Snowflake or AWS security plans is not enough. Discover how modernizing your data processes and investing in your data protection changes the way you do business.

SMB Website and API Security Fundamentals

Execution of malicious scripts was responsible for 52% of 75,000 cyber incidents. These scripts are typically used to harvest data from customer-facing websites and APIs. 60%+ such attacks target SMEs. An alarming situation when you consider the limited resource and tool budgets allocated for website and API security. A managed, enterprise-class application security offering with 24x7 SOC is, therefore, the need of the hour for SMBs.

Is Ransomware Malware?

Over the past few years, ransomware attack rates and ransom amounts have climbed so significantly that the cyber attack has broken out of the IT and security community to capture headlines around the world. In early May 2021, a suspected Russian hacking group took Colonial Pipeline — which provides 45% of the East Coast’s supply of gasoline, diesel fuel, and jet fuel — offline for more than three days in an attack that made ransomware a household word.