Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Available Now: Veracode Scan for JetBrains IDEs

Veracode Scan for VS Code was one of the big hits on the expo floor at the RSA Security conference in May this year. People liked the integration of Veracode Static, Veracode SCA, and Veracode Fix into a single extension, giving developers the tools to scan their code and resolve problems with AI assistance while they are actively developing code.

Unlock Advanced Security Automation for Next-Gen SIEM

According to the CrowdStrike 2024 Global Threat Report, the fastest recorded eCrime breakout time was just 2 minutes and 7 seconds in 2023. This underscores the need to equip security analysts with modern tools that level the playing field and enable them to work more efficiently and effectively.

Kroll Responder Managed Detection and Response - Solution Overview

Stop cyberattacks now with Kroll Responder. In this video, learn how Kroll Responder Managed Detection and Response (MDR) provides extended security monitoring around-the-clock, earlier insight into targeted threats, and complete response to contain and eradicate threats across your digital estate. Discover how our turnkey MDR service can fill gaps in your security resources by combining seasoned security expertise, frontline intelligence and unrivaled response capabilities.

Your AI Governance Blueprint: A Guide to ISO 42001 & NIST AI RMF

As businesses increasingly rely on AI to drive innovation and efficiency, ensuring that these systems are used ethically and safely becomes paramount. We’re here to help you build your blueprint to effective AI governance, stay compliant with global standards, and mitigate potential risks.

Solving Tool Sprawl: The CISOs Guide to Efficient and Effective Security Operations

Time and time again, we see enterprise security teams facing complex issues that originate from a common pain point: tool sprawl. We get it; your footprint has grown, your tech stack is more complex than ever, and your security team is having to navigate this maze of “Wait, which dashboard do I use?” Perhaps it’s time for a change.

Why Artificial Intelligence (AI) Is Neither

Artificial Intelligence (AI) is the buzzword du jour of not just tech, but the entire online world. We see it in the daily headlines of everything from industry stalwarts such as Wired (There’s an AI Candidate Running for Parliament in the UK) through the stiff-collared set at the Wall Street Journal (What the Apple-OpenAI Deal Means for Four Tech Titans). Everyone who is anyone is talking about it, training it, or trying leverage against it.

Destructive Malware: Threat Detection and Incident Response

Imagine that you have a snack you want to eat while watching a movie on a Friday night. You look in your kitchen, only to find the snack missing. Whether a roommate hid the snack or ate it, you no longer have access to it, disrupting your evening plans. This destructive behavior interrupts your weekend objectives, but it’s pretty low stakes overall.

Hallucinated Packages, Malicious AI Models, and Insecure AI-Generated Code

AI promises many advantages when it comes to application development. But it’s also giving threat actors plenty of advantages, too. It’s always important to remember that AI models can produce a lot of garbage that is really convincing—and so can attackers. “Dark” AI models can be used to purposely write malicious code, but in this blog, we’ll discuss three other distinct ways using AI models can lead to attacks.