Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Top 7 Practices to Prevent Data Leakage through ChatGPT

Generative AI (GenAI) tools like ChatGPT have already become indispensable across organizations worldwide. CEOs are particularly enthusiastic about GenAI’s ability to let employees “do more with less”. According to the McKinsey Global Survey on the State of AI in 2024, 65% of organizations already use GenAI tools extensively, and Gartner forecasts that this number will reach 80% by 2026.

CCRI renamed Cyber Operational Readiness Assessment (CORA)

The Command Cyber Readiness Inspection(CCRI) is a comprehensive cybersecurity evaluation and assessment conducted by the United States Department of Defense (DoD). A CCRI serves as a formal inspection aimed at enhancing accountability and bolstering the security posture of DoD Information Networks in alignment with DoD standards, with a specific focus on Command, Mission, Threat, and Vulnerability.

Cybersecurity forecast: Top CIOs reveal their biggest fears and plans

Did you know that 79% of top CIOs believe AI-driven cyberattacks will be the most challenging threat in the next five years? As organizations prepare for an increasingly complex threat landscape, understanding the implementation barriers and budget priorities is crucial for staying ahead. At our recent CyberShield CIO Connect 2024 event in Bangalore, we gathered valuable insights from the top CIOs in South India.

Ultimate Guide to Securing Your Devices: Step-by-Step Tips for Online Safety

Whether you've experienced a security breach, are setting up new devices, or simply enhancing your current security practices, this guide provides a step-by-step walkthrough to help you get back online securely. We've got you covered, from setting up your phone and laptop to tweaking essential security settings and securing your apps.

API Security Testing on Free Swagger collection

API security is a critical aspect of modern web applications, ensuring that your APIs are robust and secure from potential threats. In our latest video, we dive into API security testing using a free Swagger collection. Swagger, an open-source framework, allows developers to design, build, document, and test their APIs with ease. By leveraging Swagger collections, you can perform comprehensive security testing to identify vulnerabilities such as injection flaws, data exposure, and improper authentication. This proactive approach helps in mitigating risks and protecting your API endpoints from malicious attacks.

The State of Phishing-Resistant MFA

In our increasingly interconnected world, the specter of cybercrime looms larger than ever, casting a shadow over people, businesses, and governments alike. Among the slew of cyber threats bombarding entities daily, phishing attacks are a particularly pernicious menace. With each day, bad actors hone their techniques, leveraging the latest tools and psychological tactics to craft sophisticated phishing campaigns that are clever enough to defy all but the closest scrutiny.

Cybersecurity Teams, It's Time to End the Dept. of 'No'

In a never-ending effort to do their job and secure their environments, cybersecurity teams often bear the brunt of negative perceptions, labelled as the department of ‘No.’ “No” to admin privileges, “No” to personal devices, and “No” to connecting unapproved technologies. These repeated denials, although done with the best intentions, can stifle innovation and create frustration within organizations. This perception needs to change.

Navigating the New Era of ISO 27001: Insights for IT and Security Leaders

In our border and perimeter free world, connected infrastructure becomes more and more complex. Security tools need to keep up by adjusting to the new application delivery models and adapting to the shifting threat environment. That's why the recent update to the ISO 27001 compliance standard is so pivotal — it introduces new controls around data security, DevOps, and network security to help future-proof our cybersecurity strategies.

Observability Meets Security: Tracing that Connection

As outlined in a previous post, OpenTelemetry and Splunk Observability Cloud can provide great visibility when security teams investigate activity in modern environments. In this post, we look at another aspect of this visibility: how you can use traces to see directly into the workings of an application to find a potential threat. Let’s imagine we’re the security analyst, and a message comes across from the Security Operations Center (SOC).

What Is Digital Forensics? The Weapon Against Cybercrime

In 2016, a house in Middle, Ohio, went up in flames. The owner of the home, Ross Compton, claimed he was asleep when the fire broke out, waking just in time to hastily pack a suitcase, smash his bedroom window, and make an escape. However, the very technology keeping Compton alive unraveled his alibi and led to his arrest. Compton had a pacemaker, and the police, suspicious of his account, secured a warrant to access its data.