Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sumo Logic Mo Copilot: AI assistant for faster incident response and simplified troubleshooting

AI is transforming industries at an unprecedented pace. From generative AI tools revolutionizing creative work to AI assistants reshaping enterprise workflows, one thing is clear: this technology is no longer a nice-to-have; it’s a must-have. But what about DevSecOps - the teams tasked with safeguarding our modern apps and infrastructure and ensuring their reliability?

Security Threats Facing LLM Applications and 5 Ways to Mitigate Them

Large Language Models (LLMs) are AI systems trained on vast textual data to understand and generate human-like text. These models, such as OpenAI’s Chat GPT-4 and Anthropic Claude, leverage their wide-ranging language input to perform various tasks, making them versatile tools in the tech world. By processing extensive datasets, LLMs can predict subsequent word sequences in text, enabling them to craft coherent and contextually relevant responses.

Trustwave's 2025 Cybersecurity Predictions: AI as Powerful Ally for Cyber Defenders and Law Enforcement

As 2024 comes to a close, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. Over the next several weeks their thoughts will be posted here, so please read on and stay tuned! As we approach 2025, cybersecurity landscapes are set to evolve in unprecedented ways, with artificial intelligence (AI) taking center stage for both cyber defenders and threat actors alike.

Using AI and Machine Learning in Video Editing

The world of video editing is seeing some exciting advancements recently. Thanks to the inclusion of AI in editing programs, people are able to create videos with greater precision, richer color, and more special features than ever before. So, just what is it that AI is helping to bring about in the world of video editing? We will take a closer look in the sections below.

Enhancing Data Security and Privacy with Protecto's AI-Powered Tokenization

The inherently non-deterministic nature of AI inputs, processing, and outputs multiplies risks, making traditional data protection methods insufficient. In the enterprise world, unstructured data—brimming with sensitive information such as Personally Identifiable Information (PII) and Protected Health Information (PHI)—poses a significant challenge, especially as this data flows into AI agents.

Best Data Privacy Tools to Use in 2025: Protect Your Sensitive Information

Data privacy has become a major concern for businesses and individuals alike. With increasing cyber threats and stringent data protection regulations, organizations must adopt advanced tools to safeguard sensitive data. As we move into 2025, selecting the right data privacy tool is crucial for ensuring compliance and preventing unauthorized access. This blog explores the top 10 data privacy tools for 2025, highlighting their features, advantages, and potential drawbacks.

AI Risk and Governance: Foundations of a Documented, Defensible Program

Given the many laws, frameworks and industry best practices surrounding artificial intelligence (AI), it’s not surprising that lawyers, compliance professionals and others charged with AI governance and compliance are seeking a starting point for AI guidelines. A solid foundation is vital to building a program that satisfies the growing matrix of requirements while allowing companies to simplify and execute their programs amid growing complexity and change. The U.S.

Humans vs AI: Building a Security Culture That Actually Works with Noora Ahmed-Moshe

As AI reshapes cybersecurity threats, understanding how scams are evolving has never been more critical. Welcome to Razorwire. I'm Jim, and today I'm talking with Noora Ahmed-Moshe, VP of Strategy and Operations at Hoxhunt. We'll explore how AI is transforming cybersecurity threats and what that means for protecting ourselves and our organisations.