Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Are E-Gift Cards Safe?

E-gift cards can be safe to buy; however, there are some risks you should consider before purchasing them. Some cybercriminals will buy e-gift cards with stolen payment information and then resell them to others for a profit. Because e-gift cards require little to no personal information, cybercriminals can get away with scamming people with e-gift cards. Continue reading to learn more about the risks of using e-gift cards and how you can avoid being scammed.

To the Point: Journey to the secure cloud through StateRAMP (Part I)

Join us for part one of Tanium Public Sector’s first episode of our To the Point government thought leadership interview series as we sit down with Leah McGrath, executive director of StateRAMP, to discuss how the nonprofit helps governments and cloud and security service providers achieve and maintain security compliance.

To the Point: Journey to the secure cloud through StateRAMP (Part II)

Join us for part two of Tanium Public Sector’s first episode of our To the Point government thought leadership interview series as we continue our dialogue with Leah McGrath, executive director of StateRAMP, as she delves into best practices for standardization, continuous monitoring and more.

Building for the Future DevSecOps in the era of AI ML Model Development

Melissa McKay, JFrog Developer Advocate, and Sunil Bemarkar, AWS Sr. Partner Solutions Architect, discuss practical ways to mature your MLOps approach including bringing model use and development into your existing secure software supply chain and development processes. Watch to learn more and get a demo of the JFrog and Amazon SageMaker integration.

Keeping humans in the loop of AI-enhanced workflow automation: 4 best practices

In today's rapidly advancing technology landscape, the role of people in workflow automation and orchestration is more critical than ever. At Tines, we firmly believe that human oversight should be an integral part of important workflows, ensuring that all decisions are grounded in context and experience. AI in Tines is secure and private by design. This means the platform doesn’t train, log, inspect, or store any data that goes into or comes out of language models.

TracFone Breach Underscores Critical Need for Mobile Carrier API Security

The recent Federal Communications Commission (FCC) settlement with TracFone Wireless, Inc. (TracFone) for $16 million highlights a critical vulnerability within the mobile telecommunications industry: API security. The investigation revealed unauthorized access to customer data through weaknesses in TracFone's mobile carrier APIs. This incident reminds mobile carriers to prioritize robust API security measures to safeguard customer data and ensure network integrity.