Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Strengthening AI Chatbot Defenses with Targeted Penetration Tests

The world is quickly seeing the rise of AI powered customer service. The conversational agent chatbots enhance the customer experience but also introduce a new attack vector. Here's what you need to know about strengthening AI chatbot defenses. Many AI driven technologies have access to vast data sources and access to functions that assist users. AI chatbots can be used in many ways such as answering questions about an item in stock, help develop code, to helping users reset their password.

CVE-2024-24919: Check Point's Quantum Gateway comes under Attack as Hackers exploit Zero-Day Vulnerability

Check Point Cybersecurity has issued hotfixes to address a zero-day vulnerability in its VPNs that has been exploited to gain remote access to firewalls and potentially infiltrate corporate networks. On 27.04.2024 (Monday), the company initially alerted customers to an increase in attacks targeting VPN devices, offering guidance on how administrators can safeguard their systems.

Vendor-CISO Dynamics: Building Solutions Through Understanding

Explore the critical relationship between vendors and CISOs with Robert Black. He discusses the need for vendors to understand and address the specific problems faced by organisations rather than just selling solutions. This clip highlights how shifting power back to CISOs can lead to more effective cybersecurity strategies.

How to Create a GDPR-Compliant Password Policy?

If your company has ever worked with businesses in European Union countries, you probably had to follow the EU’s General Data Protection Regulation (GDPR). This rule, which started on May 25, 2018, gives customers more control over their data and makes data collection and use more transparent. A big part of the GDPR is protecting people’s privacy and data from unauthorized access. To do this, companies need a strong password policy.

Security Testing in Software Development: Assessing Vulnerabilities and Weaknesses

The critical role of security testing within software development cannot be overstated. From protecting personal information to ensuring that critical infrastructure remains unbreachable, security testing serves as the sentry against a multitude of cyber threats.

Web Application Security Testing: Struggles, Shortfalls and Solutions

High-value data, mission criticality, and sheer numbers make web applications a compelling target for cyberattacks. According to Verizon’s 2023 Data Breach Investigations Report, web applications were the most commonly exploited vector in both incidents and breaches last year.1 There’s another reason why web applications may be so attractive to threat actors. Most security teams simply cannot keep pace with demands for application updates and patching, testing, and vulnerability remediation.

Human Risk Management and Security Awareness Training

A notable statistic has appeared in the cybersecurity research landscape: Phishing and pre-texting accounted for 73% of breaches in 2023. That’s according to the 2024 Verizon Data Breach Investigations Report, and the alarming use of humans as a vector for initial access is mirrored elsewhere.

Unlocking Efficiency: Automate Your Egnyte Workflows with Microsoft Power Automate

The contemporary business landscape is progressively evolving into a realm of intricate complexity. Organizations employ an assortment of systems and tools to streamline processes, amplify productivity, optimize workflows, and abide by the constantly shifting industry norms and rigorous compliance benchmarks - all the while keeping an eye on cost efficiency. Achieving this can be a daunting task.

Understanding Vulnerability Management and Patch Management

Vulnerability management and patch management are often confused. However, it's crucial to recognize that, while complementary, they are distinct processes. Understanding the differences between vulnerability management and patch management is essential for a solid security posture. Let's delve into the concepts to understand better what they are, how they differ, and how they work together.

How Can FIM Protect Against Insider Threats

An insider threat is someone inside an organization – including current and former employees, partners, and contractors – who, intentionally or otherwise, put their organization at risk. They typically abuse their access to private information and privileged accounts to steal or sabotage sensitive data, often for financial gain or even revenge. Organizations today must have effective security solutions in place to identify and respond to insider threats.