Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Over a third of fraud attempts targeting financial institutions now use AI

One in fifteen fraud attempts now use deepfakes to attack not just B2C firms but increasingly also B2B ones. Fraud prevention decision-makers agree that AI will drive almost all identity fraud in the future, and more people will fall victim than ever before.

ChatGPT: A Tool for Attackers and Defenders

ChatGPT impresses everyone with its writing capabilities; however, its proficiency in understanding and generating human-like text has inadvertently empowered threat actors to produce realistic and error-free phishing emails, which can be challenging to detect. The use of ChatGPT in cyberattacks poses a significant threat, particularly for attackers whose first language isn’t English. This tool helps them overcome language barriers, enabling the creation of more convincing phishing content.

New CIP standards: Why utilities shouldn't wait to deploy

On May 9, the North American Electric Reliability Corporation (NERC) officially adopted new Critical Infrastructure Protection (CIP) requirements for Internal Network Security Monitoring (INSM). This is one of the last steps before Federal regulators make it an official standard for utilities and the electrical power grid industry. What does it mean? Compliance for CIP-015-1 is coming to your utility. Utilities will need monitoring tools with deep and wide asset intelligence and network control.

CVE-2024-24919: Information Disclosure Vulnerability Leveraged to Target Check Point VPNs

On May 27, 2024, Check Point released hot fixes for an information disclosure vulnerability being leveraged by threat actors to target Check Point VPNs. This vulnerability was labeled as CVE-2024-24919 and is rated as high severity, as a remote threat actor can exploit the vulnerability to access information on Gateways connected to the Internet, with IPSec VPN, Remote Access VPN or Mobile Access enabled.

Cloudflare acquires BastionZero to extend Zero Trust access to IT infrastructure

We’re excited to announce that BastionZero, a Zero Trust infrastructure access platform, has joined Cloudflare. This acquisition extends our Zero Trust Network Access (ZTNA) flows with native access management for infrastructure like servers, Kubernetes clusters, and databases.

Revolutionizing Security: Brivo's Unified Platform for Enhanced Collaboration

Dive into the world of advanced security with Brivo's groundbreaking collaborative framework. In this video, we explore how Brivo is changing the game by fostering open collaboration among providers to create an integrated security environment. Discover how this approach allows customers to control and respond to events from a single platform, making security management more efficient and effective than ever before.

Gap Analysis - Leverage what you do now to set yourself up for success in the future as well.

How TrustCloud leverages the work you do now and sets you up for success in the future as well. Gap analysis is designed to give you insight into other compliance standards and your gaps with them. If you are looking to pursue other standards, this tool is great for determining the level of effort required from your team.

2024 Red Hat Summit with Exec Chair, David Safaii: Exciting Announcements, Exciting Problems on Everyone's Minds

The 2024 Red Hat Summit in Denver was a whirlwind of innovation, collaboration, and networking. The show kicked off with a great turnout for the Community and Red Hat OpenShift Days. The focus here was on Case Studies from and by End Users with production deployments of OpenShift sharing their use cases, insights into their workloads and lessons learned along the way.