Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

New State of Phishing Report 2023: An Alarming Surge in Phishing Threats

The fight against cyber threats remains a top priority for all organizations, including phishing attacks. SlashNext just released its much-anticipated annual "State of Phishing Report for 2023." This report sheds light on the alarming surge in phishing threats across email, web, and mobile channels. We will delve into the key findings and insights from the report, highlighting the growing influence of generative AI tools in cybercriminal activities. The Phishing Landscape: A Disturbing Uptick.

Move to the Cloud with Confidence: 6 Key Risks & Mitigation Techniques, Part 3

Cloud application, platform, and infrastructure vendors (cloud service providers, or CSPs) do a great job of advertising online. They offer seemingly painless ways to sign up for their services through “freemiums” and two-week trials, advertisements that follow you from Google to LinkedIn, and what appear to be straight-forward sales processes.

The Role of Artificial Intelligence in Cybersecurity - and the Unseen Risks of Using It

The concept of automation has been around for decades in the software field, but recent advancements in machine learning and natural language processing have led to huge breakthroughs. We’ve gone from machines that complete rules-based, predetermined tasks to a new generation of software that “learns” from huge sets of data so that it can make predictions — collectively known as artificial intelligence (AI).

Unlocking Growth: Building a Business Case for GRC Applications

In the ever-evolving landscape of modern business, staying ahead of the curve has become synonymous with survival. Governance, risk, and compliance (GRC) applications have emerged as the guardians of stability, security, and sustainable growth. So how can you assure your organization invests wisely in these essential tools? If you’re like me, you’ve struggled in the past to justify the investment in GRC and the necessary technology to support it.

A10 Networks Simplifies Google Cloud Platform Cloud Deployments

A10 Networks has expanded its robust application delivery controller (ADC) solution to Google Cloud Platform (GCP), meeting the increasing demand for powerful and scalable application delivery in the cloud. Customers can now rapidly deploy A10 Thunder® ADC on GCP via the Google Cloud Marketplace.

The Importance of Securing Payroll Data: Best Practices for Small Businesses

In an era dominated by digital transactions and online operations, safeguarding payroll data has become a critical concern for businesses of all sizes. Delve into the significance of this task and learn about the methodologies small businesses can adopt to enhance their payroll data security.

Testing with OpenAPI Specifications

The 2023 SANS Survey on API Security (Jun-2023) found that less than 50 percent of respondents have API security testing tools in place. Even fewer (29 percent) have API discovery tools. Wallarm delivers both these capabilities via our single, integrated App and API Security platform. Wallarm has long offered the ability to generate OpenAPI Specifications (aka Swagger) based on actual traffic across your endpoints.

Trustwave Measures the Pros and Cons of President Biden's Executive Order to Regulate AI Development

President Joe Biden, on October 30, signed the first-ever Executive Order designed to regulate and formulate the safe, secure, and trustworthy development and use of artificial intelligence within the United States. Overall, Trustwave’s leadership commended the Executive Order, but raised several questions concerning the government’s ability to enforce the ruling and the impact it may have on AI’s development in the coming years.

CrowdStrike Achieves 100% Ransomware Protection Accuracy and 100% EDR Rating in SE Labs Test

Ransomware is a scourge that is on track to inflict over $30 billion in damages in 2023. Businesses and organizations that are hit by a ransomware attack face a potentially devastating data breach, with system downtime, recovery, negative publicity and the likelihood of a ransom payment to deal with. Many small businesses are unable to recover from the ordeal and end up permanently shutting their doors within months of being hit.