Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

6 Key Principles of AI and Data Protection: How the AI Act Safeguards Your Data

Artificial Intelligence (AI) plays a critical role in modern data handling. AI processes vast amounts of data, from personal information to business analytics, at unprecedented speeds. This raises serious concerns about AI and data protection. With AI’s growing capabilities, ensuring the security of personal data is essential. The AI Act aims to regulate AI systems, focusing on responsible data usage. It introduces rules that safeguard user data, complementing existing regulations like GDPR.

Major X Accounts Hack Fizzles in Botched Crypto Scam Attempt

A wave of X account hacks has led to the rapid success of a pump-and-dump scheme for the $HACKED Solana token, with users rushing to buy in. High-profile accounts compromised in this attack include MoneyControl (1.4 million followers), People Magazine (7.8 million), and EUinmyRegion, run by the European Commission, with nearly 100,000 followers. Moreover, Computer brand Lenovo’s India division, film director Oliver Stone, Yahoo News UK, and Brazilian soccer player Neymar Jr.

Want better network visibility? Don't just go with the (net)flow

In the Black Hat Network Operations Center (NOC), the conference’s leadership team must assemble best-in-class technologies that complement each other to build and harden an enterprise-grade network in just a few days. Then, the NOC must continuously monitor and adapt the network throughout the course of the conference before dismantling it after the conference concludes.

Risks and Mitigation of Insider Threats

Insider attacks are growing, whereby 60% of organizations in the past year alone have suffered employee-related data breaches. Surprised? Most businesses get blindsided by the people they put their most trust in. It can be accidental data leaks or malicious actions, but the risk is very real and, regrettably, on the rise. It’s no longer a matter of “if,” but rather “when” an insider threat could compromise your organization’s most sensitive data.

Shift left with the Sysdig extension for Visual Studio Code

Adversaries exploit security blind spots and sneak through traditional defenses to craft attacks that impact your operations, or even worse, your reputation. One recent example is the Revival Hijack supply-chain attack, where threat actors registered new PyPi projects with names of previously deleted packages. One way to counter this imminent threat is to “shift left,” or take ownership of the code’s security posture earlier in the development process.

Complete your Kubernetes security with runtime protection

Kubernetes today is the de facto standard for container orchestration, deployment automation, scaling, and management of containerized apps. The robustness and scalability of this open-source platform make it a valuable tool for businesses leveraging cloud-native technologies and DevOps practices. However, as with any technology that handles sensitive data and crucial operations, the importance of security in Kubernetes environments can’t be overstated.

Fireblocks x Lido Institutional: Bringing Liquid Staking to the Fireblocks Network

In response to growing institutional demand, Fireblocks has launched an integration with Lido to provide easy and secure in-platform access to Lido’s liquid staking protocol and stETH token. Users can now stake their ETH, receive rewards, and use stETH for on-chain activities, including Fireblocks Off Exchange, which allows Fireblocks users to lock their stETH in a self-custodial collateral wallet to trade on exchanges like Deribit and Bybit.

Effortlessly Migrate Your AKS Clusters to Azure Container Storage Using CloudCasa

Azure Container Storage is a cloud-based volume management, deployment, and orchestration service built natively for containers. It integrates with Kubernetes, allowing you to dynamically and automatically provision persistent volumes to store data for stateful applications running on Kubernetes clusters.