Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Defensive AI and Why is it Essential in Bot Protection?

The definition of Artificial Intelligence (AI) has been thrown around whilst it has risen to the top of the tech agenda over the past couple of years. Security professionals have determined AI to be a risk to businesses, and also an opportunity. But could it also be a way to better defend your network against attacks? For many years, AI and Machine Learning have gone hand in hand; with AI used to better determine defensive decisions and cut down on the human element in more basic functions.

Email Security Must Remain a Priority in the Wake of the LabHost Takedown and BEC Operator's Conviction

Two positive steps were taken last month to limit the damage caused by phishing and Business Email Compromise (BEC) attacks when a joint action by UK and EU law enforcement agencies compromised the infrastructure of the phishing-as-a-service operation LabHost and a major BEC operator was convicted in US Federal Court. While law enforcement operations are integral to defeating cybercrime, disrupting one or two adversary groups does not minimize the threat.

Vodafone Idea becomes Industry First to achieve SOC2 Type 2 Attestation

In a significant achievement for the Indian telecommunications industry, Vodafone Idea (Vi) has become the first Indian company to secure the SOC 2 Type 2 attestation. This significant milestone not only underscores its unwavering commitment to data security but also cements its position as an industry leader in fostering trust and transparency. The attestation was conducted by VISTA InfoSec, a global Information Security Consulting firm with offices based in the US, UK, Singapore, and India specializing in GDPR, PCI DSS, HIPAA, ISO 27001, and other types of security compliance standards.

Preventing broken access control in express Node.js applications

Access control in backend Node.js applications is fundamental to web applications built with the Express web framework. It ensures users can access only the data and functionality they're authorized to use. However, when access control is compromised, users can access data that they shouldn't be able to. This is especially problematic if attackers attempt to manipulate or steal private data.

Automating Incident Response Workflows with LimaCharlie

As a security professional, you know that the ability to swiftly and effectively respond to threats is crucial. In this post, we’ll explore how LimaCharlie, a SecOps Cloud Platform, can help automate comprehensive Incident Response (IR) workflows, including forensic triage acquisition, evidence processing, and forensic timeline generation.

Responsible AI Licenses (RAIL): Here's What You Need to Know

Responsible AI Licenses (RAIL) are a class of licenses created with the intention of preventing harmful or unethical uses of artificial intelligence while also allowing for the free and open sharing of models between those who intend to use and improve them for authorized purposes. Anyone can make their own version of RAIL for their model, and in doing so can create more or less restrictions than those detailed in the template licenses.

Navigating the Role of a Data Project Manager: Crafting an Effective Job Description

In today's data-driven world, the role of a Data Project Manager is becoming increasingly vital. These professionals are tasked with overseeing projects that involve data collection, analysis, and interpretation, ensuring that they are completed on time, within budget, and with the desired outcomes. In this article, we'll delve into the intricacies of a Data Project Manager's job description, outlining key responsibilities, required skills, and qualifications for the role, and why they are crucial in driving successful data projects.
Featured Post

Useful Questions To Navigate the TIP Vendor Landscape

In today's escalating threat landscape, Security Operations Center (SOC) teams face a constant cat and mouse battle against adversaries as they try to stay one step ahead. This situation isn't helped by the fragmented tools; multiple data feeds and data siloes they must contend with. Likewise, with so many security vendors out there with different approaches and solutions, how do they know what cybersecurity solutions they should be investing in?