Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Watershed Moment for Responsible AI or Just Another Conversation Starter?

The Biden Administration’s recent moves to promote “responsible innovation” in artificial intelligence may not fully satiate the appetites of AI enthusiasts or defuse the fears of AI skeptics. But the moves do appear to at least start to form a long-awaited framework for the ongoing development of one of the more controversial technologies impacting people’s daily lives. The May 4 announcement included three pieces of news.

INETCO's Ali Solehdin Talks EBT Fraud Prevention and AI with The Center Square

Scott McClallen – Staff Reporter – The Center Square (The Center Square) – Nationwide, electronic benefits transfer fraud is estimated to cost taxpayers up to $4.7 billion annually, according to the Government Accountability Office. In 2022, the Supplemental Nutrition Assistance Program distributed over $113.7 billion to nearly 22 million households. The federal government entrusts states to reduce fraud in safety net programs. In March, the U.S.

Security Journeys: From Change Management to Compliance

Zero Trust seems to no longer command the volume of articles that once set it up as a trend that promised a bright new future for security. This is in part because security is a journey. Rushed implementations and low returns often result in burnout with new technology, and generally the real work happens in the quiet stages when analysts and consultants are putting together the tooling and playbooks that deliver true value and not just a “checkbox outcome.”

Common Social Media Scams and How to Avoid Them

While there are an estimated 30,000 daily cyber attacks on business websites, there are roughly ten times as many attacks against social media accounts every single day, equating to roughly 1.4 billion accounts every month. Social media attacks and scams have become pervasive problems, with threat actors finding innovative new ways to deceive users and steal their information.

SafeBreach Coverage for US-CERT Alert (AA23-136A) - BianLian Ransomware Group

On May 16th, Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Cyber Security Centre (ACSC) released an advisory highlighting the various malicious indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) being leveraged by the BianLian ransomware group.

Unveiling the Future of AI in Cybersecurity

Welcome to our latest podcast episode, where we delve into the fascinating realm of AI in cybersecurity. Phil Agcaoili, the esteemed entrepreneur, and former CISO professional, joins us in this fascinating discussion. Alongside our hosts, Max Aulakh and Joel Yonts, we unravel the profound impact of artificial intelligence on cybersecurity, compliance, and the workforce.

Is Privileged Access Management Important for SMBs?

Yes, Privileged Access Management (PAM) is important for Small and Medium-Sized Businesses (SMBs). Any business that has privileged systems and accounts to secure and manage needs a PAM solution. Without a PAM solution in place, businesses are at a greater risk of suffering a cyberattack which can be financially and reputationally devastating. Continue reading to learn more about privileged access management and how it benefits SMBs.

Recession Planning: Min-maxing Your Cybersecurity Program for Better Business Outcomes

Over the last two years, digital transformation has accelerated at breakneck speed, opening new lines of business that meet user demand. Reality is, online banking, order-ahead meals, telehealth appointments, and online grocery shopping are no longer optional. Users expect these to be available 24/7, so any business that wants to compete and values customer loyalty needs to digitize its services as much as possible.

The Top Compliance Regulations for Financial Institutions

Financial institutions experience a level of regulatory burden and security compliance requirements that few other industries must contend with. Since they’re a central target for attackers due to the money they move and the vast amounts of data they possess, they’ve become a central focus for regulators due to the danger to the global economy should one of them fall victim to a breach.