Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Gear up to combat data theft by securing user access permissions

The tech industry is evolving at lightning speed, and with it, cyberattacks are surging. In this year’s April IT governance data breach report, the education industry suffered the highest number of data breach incidents followed by the healthcare industry, while the IT services and software sector had the most number of records breached. Why? Often, it is the lack of an access certification process that leaves an organization defenseless against privilege exploitation.

Fireblocks Joins Stablecoin Standard to Establish Governance and Security Standards for Stablecoins

Stablecoin Standard, the industry body for stablecoin issuers globally, has today announced that Fireblocks, an enterprise platform for building blockchain applications and managing digital asset operations, has joined as an industry partner to help establish security standards for the issuance of stablecoins.

Introducing our report, CISO Perspectives: Separating the realityof AI fromthe hype

The explosion of AI has ignited both excitement and apprehension across various industries. While AI is undeniably having a positive impact on engineering and customer service teams, cybersecurity and IT practitioners remain cautious. Concerns about data privacy, the inflexibility of disparate tools, and the sensitive nature of many mission-critical workflows—which, more often than not, require some level of human oversight—fuel a deep mistrust of LLMs by these teams.

Random but Memorable - Episode 13.2: Worst Computer Outage Apocalypse with Geoff White

What was the cause of the worst cyber event in history? In Watchtower Weekly, we unpack how a small bug in Crowdstrike software caused an outage apocalypse across the globe. Agony Aunt Roo also answers all your security woes in #Ask1Password. Plus, we welcome back friend-of-the-show Geoff White, for story time as he gives a peek into his latest book: Rinsed. Settle in, as Geoff reveals how much technology has revolutionized money laundering, from drug cartels washing their cash in Bitcoin to organized fraud gangs recruiting money mules on social media.

Trustwave Managed Vulnerability Scanning Shines a Light on Vulnerabilities

The digital landscape constantly shifts, presenting exciting opportunities and lurking threats for businesses of all sizes. In this ever-evolving environment, maintaining a secure network is no longer a luxury; it's a necessity. However, achieving true security requires more than just firewalls and antivirus software. It demands a comprehensive understanding of your network's vulnerabilities – the chinks in your digital armor that attackers could exploit.

Best Cloud Storage for Personal Use and Privacy 2024

Cloud storage is a versatile and competitive market, so making a decision about choosing the best cloud storage services can seem intimidating. Fortunately, best cloud storage for personal use offers many features and services to securely store personal files, backups, sync, and protect your privacy online.

LLM Security: Splunk & OWASP Top 10 for LLM-based Applications

As a small kid, I remember watching flying monkeys, talking lions, and houses landing on evil witches in the film The Wizard of Oz and thinking how amazing it was. Once the curtain pulled back, exposing the wizard as a smart but ordinary person, I felt slightly let down. The recent explosion of AI, and more specifically, large language models (LLMs), feels similar. On the surface, they look like magic, but behind the curtain, LLMs are just complex systems created by humans.

Firmware Vulnerabilities Run Rampant in Cellular Routers

The current state of OT/IOT security is being repainted with a new coat of risk. The shade of color? Cellular routers and the vulnerabilities within firmware. In our new report with Finite State, our joint research explores the risks organizations face within the software supply chains of OT/IoT routers. Hardware has firmware – operational software – within its memory components.