Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 Strategies for Cutting the Costs of Insider Threats

The costs associated with insider threats continued to rise in 2022. This is bad news for organizations that are already under financial pressure from the uncertainty of the economy. As interest rates continue to climb and customers become more conservative about how they spend, the last thing that any organization needs is to be putting out fires from security incidents coming from arsonists inside their own house.

Protegrity Announces Borderless Data Solution to Enable Secure and Compliant Cross-Border Data Flows

With this new solution, global enterprises can navigate increasingly regulated, fragmented data privacy landscape by enabling data transfers across geographies and lines of business.

Win The AI Wars To Enhance Security And Decrease Cyber Risk

With all the overwrought hype with ChatGPT and AI…much of it earned…you could be forgiven for thinking that only the bad actors are going to be using these advanced technologies and the rest of us are at their mercy. But this is not an asymmetric battle where the bad actors use AI and the rest of us are struggling using our pencils and abacuses to catch up. It is the good side that invented and is accelerating AI. It is the good scientists that made ChatGPT and all of its competitors.

Recent Artificial Intelligence Hype is Used for Phishbait

Anticipation leads people to suspend their better judgment as a new campaign of credential theft exploits a person’s excitement about the newest AI systems not yet available to the general public. On Tuesday morning, April 11th, Veriti explained that several unknown actors are making false Facebook ads which advertise a free download of AIs like ChatGPT and Google Bard.

What is Code Signing? Benefits of DigiCert Code Signing Certificate

Whether you’re someone who creates computer software or just uses it, it’s essential to know about the code signing process. It is crucial to do so, as this is one of the methods that help you keep your computer safe and secure. Now, it might be possible that after reading the above content, you start wondering what code signing is and why it is important.

Hello CISO - Episode 11 - Part 2: Hiring Top Tier Security Professionals

Hiring can be more art than science. What should you look for when hiring security professionals? How important are degrees and certifications, really? In this episode, Troy breaks down how to spot the brightest talent. Hello CISO is a collaboration between Troy Hunt and the people who build the world's most trusted enterprise password manager.