Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Will Proposed Rules for Health Industry Actually Strengthen Cybersecurity?

If you’re a US citizen, you’re likely numb to the endless letters informing you of your information being stolen yet again. For most of us, this is an annoyance and an inconvenience. But if you’re a patient in a hospital during an attack, it would be disconcerting to know that studies indicate medical errors increase by 30% when clinical applications are offline, and there’s a “small but significant” increase in patient mortality.

Speed meets security: Pascal Wehrlein races Cato's Etay Maor

Get ready for a high-speed showdown as ABB FIA Formula E Drivers' Champion Pascal Wehrlein teams up with Etay Maor, Chief Security Strategist at Cato Networks, in a thrilling race on Formula E simulators. Can Etay keep up with Pascal on the track? And can they make the right calls in the world of IT security? Hit play and see who comes out on top! Let’s connect.

How AI-powered Secure Email Gateways Fight Back vs. AI-armed Bad Actors

As bad actors use artificial intelligence to step up their phishing game, mounting an effective defense means using a secure email gateway that likewise employs AI to detect even the most cleverly crafted phishing emails and the fraudulent websites to which the emails attempt to direct recipients. The concern is not just with generative AI (GenAI) tools like ChatGPT, which has some (rather limited) guardrails to prevent nefarious use.

EP 1 - AI Gone Rogue: FuzzyAI and LLM Threats

In the inaugural episode of the Security Matters podcast, host David Puner dives into the world of AI security with CyberArk Labs' Principal Cyber Researcher, Eran Shimony. Discover how FuzzyAI is revolutionizing the protection of large language models (LLMs) by identifying vulnerabilities before attackers can exploit them. Learn about the challenges of securing generative AI and the innovative techniques used to stay ahead of threats. Tune in for an insightful discussion on the future of AI security and the importance of safeguarding LLMs.

CIEM Podcast - What it is. How it fits. Challenges you should know. Advice for how to get started.

This podcast is a quick but informative discussion into CIEM, it's definition, its importance, and its role within a comprehensive IAM and cybersecurity program. As organizations accelerate their migration to cloud environments, managing access and entitlements within these dynamic infrastructures becomes increasingly critical. Cloud Infrastructure Entitlements Management (CIEM) has emerged as a pivotal component in the broader Identity and Access Management (IAM) and cybersecurity landscape.

Securing Budget for TPRM: How to Convince Executives to Invest

Advocating for a larger budget is a common need for most security professionals. With so many business obligations fighting for priority and funding, even vital concerns like Vendor Risk Management can fall through the cracks. However, third-party cyber risks can devastate businesses in the blink of an eye—meaning maintaining a proper third-party risk management program should be at the top of your priority list.

Web-Based AI Agents: Unveiling the Emerging Insider Threat

The introduction of OpenAI’s ‘Operator’ is a game changer for AI-driven automation. Currently designed for consumers, it’s only a matter of time before such web-based AI agents are widely adopted in the workplace. These agents aren’t just chatbots; they replicate human interaction with web applications, executing commands and automating actions that once required manual input.

Securing Data Flows into Your Cloud Data Warehouse

Traditionally, data security focused on protecting data at rest within the confines of your on-premise data center. The cloud era has blurred these lines. Data now flows through complex pipelines, often traversing multiple services and third-party vendors. This expanded data perimeter creates new vulnerabilities: It’s crucial to ensure that the data loaded into warehouses and analytics tools is scanned for sensitive information and redacted or redirected accordingly.