Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is AI?

What is AI really? Throughout this article, I will remove the hype and get to the most honest answer ever. Artificial Intelligence, or AI, or at least the first version of how we think of it today, was “invented” in the 1950s…a long time ago. Since then, various computer scientists and groups have worked on different iterations, often using different names, including machine learning and neural networks.

theNET's Trending Stories: Security for an AI-powered, quantum-enhanced era

Tech leaders are racing to adopt today’s AI tools and envisioning ways to capitalize on tomorrow’s quantum computers. But cybercriminals are a few steps ahead. This month, theNET examines ways to make the most of AI agents while augmenting security with AI-enhanced solutions and safeguarding data with post-quantum cryptography.

What is Application Security Testing?

Application Security Testing is the process of identifying, analyzing, and fixing security flaws in applications to prevent data breaches, code vulnerabilities, and cyberattacks. With applications becoming the front door to your business, ensuring they're secure is no longer optional it is critical. This video explores Application Security Testing in depth, helping you understand what it is, how it works, and why it’s essential for protecting your digital assets.

Securing Payment Pages: PCI DSS 11.6.1 Guide

PCI DSS 11.6.1 (4.0) requires merchants and TPSPs to deploy change- and tamper-detection mechanisms that monitor and alert on unauthorized modifications to payment page scripts and HTTP headers, as seen in the customer’s browser. Monitoring must occur weekly or per a risk-based schedule. Tools like CSP, script behavior monitors, and alerting systems help ensure compliance and prevent e-skimming threats like Magecart.

Is Azure DevOps Down? How To Ensure Resilience

With the growing popularity of Azure DevOps comes an increased need for proper security of data being stored there. A large aspect of ensuring the security of Azure DevOps ecosystems lies in facilitating data resilience. This means to guarantee the availability to protect, keep, and recover data in case of any disruptions, both intentional and accidental.

How Browser-Level Signals Help Prevent Credential Stuffing Attacks

Credential stuffing attacks are one of the most persistent and damaging account-based threats facing security teams – and one of the hardest to detect. In 2024, Akamai, a global leader in content delivery and cybersecurity, reported more than 26 billion credential stuffing attempts globally every month – a staggering volume that’s not slowing down. Most enterprises rely on server-side, post-login detection, which captures only successful login attempts.