Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI-driven cyber attacks to be the norm within a year, say security leaders

New research from Netacea reveals 93% of security leaders expect to face daily AI-driven attacks by the end of this year. Ransomware and phishing attacks are expected to be enhanced by offensive AI, but bots remain an underestimated threat. All respondents are benefiting from AI in their security stack, but adoption of bot management is lagging behind.
Featured Post

Human risk management automation can help beat burnout

Cyber criminals are relentlessly exploiting new technologies to improve their chances of success. As such, security professionals are feeling the pressure of keeping watch against these threats and trying to stay a step ahead of these criminals.
Featured Post

Hacked Creativity? How Cyber Security Threats Impact Artists

The creative industries have undergone a rapid shift thanks to digitisation. The emergence of cutting-edge cloud-based storage, automation and artificial intelligence (AI) tools has allowed creatives from all walks of life to innovate and enhance how they work while alleviating themselves from many arduous, repetitive, and time-consuming tasks.

Combating phishing attacks with passwordless FIDO2 authentication

Attackers predominantly use phishing attacks to steal and misuse user identities. A global Statista study on employee-reported malicious emails revealed that in the first quarter of 2023, 58.2% of malicious emails were credential theft attacks, 40.5% were impersonation attacks, and 1.3% were malware deliveries. Phishing attacks create a sense of urgency and panic in users, who, as a result, easily fall victim to them.

Data Breach Response and Investigation: 8 Steps for Efficient Remediation

From financial losses to legal issues to a damaged reputation, the consequences of a data breach can severely impair organizations. Therefore, having robust data breach incident response and investigation procedures is critical for organizations to mitigate the impact of such incidents. In this article, we review what a data breach is and how it can influence your organization as well as provide eight simple steps to efficiently respond to and investigate data breaches.

The Real Challenges of InfoSec: Overcoming Business Skepticism

Uncover the untold pressures of cybersecurity professionals with this revealing episode from the Razorwire Podcast. Discover the challenges faced by those in information security, often unseen and underappreciated in the business world. From being perceived as pessimists to being labeled as merely "digital security guards," hear firsthand from an experienced security veteran about the misconceptions and struggles of protecting a well-known newspaper's digital gates. This short will shine a light on why cybersecurity is not just about technology, but also about overcoming skepticism and validating the crucial role of security in every organization.

How Exposure Visibility Turbo Charges Strategic Security Prioritization

One of the biggest benefits that an exposure management program can afford a security program is the power of risk-informed prioritization. When security leaders think of tooling like attack surface management (ASM) platforms, the most evident prioritization benefits come in the day-to-day tactical decisions of which threats and which exposures to have SecOps practitioners tackle first.

Announcing our $50M Series B extension

Today, we’re incredibly excited to announce a major milestone in the Tines journey. We recently completed a second Series B extension, raising an additional $50M from existing investors. What does this news mean for Tines? Well, first and foremost, our mission doesn't change. We're more focused than ever on powering the world's most important workflows. This new funding will allow us to pursue the full breadth of our ambitions.

A Postmortem of Microsoft's Security Incident - The 443 Podcast

🔈📽️ This week on the podcast, Corey Nachreiner and Marc Laliberte cover a report from the Department of Homeland Security's Cyber Safety Review Board that analyzes Microsoft's Exchange Online 2023 security incident in excruciating detail. Before that, we cover CISA's new rules around cyber incident reporting and an unsealed indictment against 7 Chinese nationals.