Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How To Spot a Credit Card Skimmer

According to the FBI, credit card skimming costs individuals and banks approximately $1 billion annually. You can spot a credit card skimmer by searching for a tampered security seal, checking for misalignments, wiggling the card reader or looking inside the card reader. Continue reading to learn more about credit card skimmers, how to spot them and what you can do if your card gets skimmed.

Prompt Sanitization: 5 Steps for Protecting Data Privacy in AI Apps

As Generative AI (GenAI) and Large Language Models (LLMs) become integral to modern apps, we face a critical challenge of protecting sensitive user data from inadvertent exposure. In this article, we’ll explore the importance of content filtering in LLM-powered apps, and provide strategies for its implementation. Looking for step-by-step tutorials on prompt sanitization for OpenAI, Langchain, Anthropic, and more? Skip down to the “Tutorials & further learning” section below.

Install ggshield On macOS Using Signed .pkg Files

MacOS users can now opt to install ggshield using our new signed packages. Installing ggshield, the GitGuardian CLI is a very quick process, but traditionally has required use of python's pip or homebrew on a macOS system. With the release of ggshield 1.27.0 we are now proud to offer signed DOT P G K files, making it possible to easily distribute ggshield to your team and leverage the official Mac Installer. Since it is officially signed, once downloaded, it just takes a couple of clicks to get it installed.

Let's Dance: Securing Access with PIM and PAM to Prevent Breaches

I know when to log out Know when to log in Get things done In the spirit of David Bowie, let's explore how to navigate the labyrinth of privileged access management without getting "Under Pressure." No one wants to mistype a common command, copy their proprietary data to a public location, or delete their operating system. Having multiple accounts—one for regular activities and specific privileged accounts to do sensitive tasks—ought to focus effort and prevent mistakes.

Employee Cybersecurity Awareness Training Strategies for AI-Enhanced Attacks

With the adoption of AI in almost every sphere of our lives and its unending advancement, cyberattacks are rapidly increasing. Threat actors with malicious intent use AI tools to create phishing emails and other AI-generated content to bypass traditional security measures. On the bright side, the security capabilities of AI are limitless. AI-enhanced attacks refer to cybersecurity events that use artificial intelligence to compromise individuals' and organizations' safety.

The Ban That Wasn't: What Happened to the FTC's Non-Compete Ban?

Today was supposed to mark a significant shift in employment law in the US: the Federal Trade Commission’s (FTC) ban on non-compete clauses was set to go into effect. However, this anticipated change was blocked by a US District Court in Texas, leaving many wondering about the implications for small and medium-sized enterprises (SMEs) and the IT professionals they employ.

Cybersecurity in a Cycle: Balancing Repair and Replacement for Optimal Security

Regularly updating your policies, software, and systems is crucial to your long-term cybersecurity efforts. However, failing to properly plan these updates can undermine your continuity plans and impede your business's productivity and profitability. As a cybersecurity specialist, you can balance repairs and replacements by creating a dynamic, adaptive strategy that accounts for industry trends and responds to emerging threats without causing unnecessary expenses to the company.