Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

API Security Testing for Healthcare: A Guide

Healthcare breaches don’t just steal data; they erode trust, disrupt care, and cost millions. The 2015 Anthem data breach compromised 78.8 million records. Since then, attacks have only grown in frequency and sophistication, pushing the average healthcare breach cost to.1 million in 2022 (IBM’s Cost of a Data Breach). For years, healthcare security has focused on perimeter defenses, yet breaches keep escalating.

Cisco Research AI Inference Infrastructure Summit

Cisco Research hosted a virtual summit on AI Inference Infrastructure, bringing together researchers to explore challenges in this space. The summit includes presentations from university professors and students collaborating with the Cisco Research team, including Aditya Akella (UT Austin), Rachee Singh (Cornell University), Alexey Tumanov (GA Tech), and Neeraja Yadwadkar (UT Austin).

Best DevSecOps Tools for Application Security in 2025

Building secure applications is about more than just adding security features at the end of the development process. It’s about addressing vulnerabilities and threats as they arise and improving security continuously—right from the start. That’s the power of DevSecOps.

Zenity Recognized in Gartner AI TRiSM Market Guide

Innovation, specifically the evolution of technology, has always been about expanding what’s possible or simplifying today’s complexity – sometimes both. We saw this with the internet revolution, adoption of cloud computing, remote working, low-code/no-code, and now AI is fundamentally reshaping how teams operate. While these advancements bring opportunities for organizations and push people’s creativity to new limits, they also introduce new risks.

DataTrails and Daiki Join Forces to Revolutionize Trust and Governance in the AI Era

Confidently scale AI initiatives with irrefutable proof of ethical data practices and compliant AI operations. In today’s rapidly evolving digital landscape, the intersection of data provenance and AI governance has become mission-critical for businesses. As AI continues to shape industries – from healthcare and finance to media and technology – the need for verifiable data integrity and responsible AI oversight has never been more urgent.

Securing AI vs AI Security: What Are We Talking About?

Lately, it seems like the only thing anyone is talking about in the technology sector is Artificial Intelligence. With good reason! AI is an incredibly powerful tool that is only going to grow in usage and scope. However, there seems to be a lot of confusion around various terms involving AI and security. The focus of this blog will be breaking down the differences between securing AI, secure AI use, AI for security, and AI safety.

Custom Policy Management in Black Duck SCA | Black Duck

You need the ability to tune open source risk management based on your team's unique risk tolerance and application lifecycle. Black Duck SCA enables this with custom policy configuration, allowing you to... Explore the powerful customization options in BlackDuck SCA to manage and mitigate risks effectively.

Cloud Storage With Zero Knowledge Encryption: Which One is The Best?

If you’re considering a private storage solution for your files online, you may have heard the term zero-knowledge encryption (ZKE). ZKE stands out from other cloud providers because it emphasizes privacy. By choosing cloud storage with zero-knowledge encryption, you are given full control over the security and privacy of your files, and you will protect them from companies like Google, who use your data for profit or to train their AI models.