Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Falcon Insight for ChromeOS Adds Automated Response Actions and GovCloud Support

Adversaries move fast, and so must defenders. CrowdStrike is raising the bar for ChromeOS security with two major advancements in CrowdStrike Falcon Insight for ChromeOS. New automated response actions deliver rapid device containment, and expanded support for GovCloud designed to support customers working toward meeting high compliance standards.

Boost data security with attestation of compliance: Essential for 2025

Data is one of the most valuable assets organizations possess. As data volumes grow and cyberthreats evolve, ensuring data security is more critical than ever. One of the most effective measures in safeguarding sensitive information is through the attestation of compliance.

Code Scanning in 2025: Why, How & the Role of Scanning in AI Security

Code scanning is the process of automatically analyzing source code to identify potential security vulnerabilities, bugs, and other code quality issues. It’s a crucial part of secure application development, helping teams detect and fix problems early in the software development lifecycle. Code scanning tools mainly use static analysis methods (examining code without running it), in contrast to dynamic analysis tools which analyze applications while they are running.

What's New in Automate - Autonomous Endpoint Management - Tanium Tech Talks #143

Get back time in your IT day, automating processes that previously consumed hours, now with repeatable consistency. Tanium Automate is the workflow component in our Autonomous Endpoint Management suite of features. Automate Playbooks are now more flexible and reusable with both dynamic parameters and launching from dashboards. Launch playbooks from dashboards Integration with Deploy Parameterized playbooks RBAC aware API enabled.

5 minutes of audio is all it takes to clone your voice #cybersecurity #AI

Just five minutes of audio is all it takes to create a convincing real-time voice clone, no specialized hardware or massive datasets needed. In this week's episode of The Cybersecurity Defenders Podcast, we cover the latest threats from voice cloning technology to China-linked infrastructure attacks. NCC Group researchers used cloned voices to extract confidential data from real organizations. But the bigger threat isn't corporate espionage. It's everyday scams becoming far more convincing.

A CISO's Guide to the Business Risks of AI Development Platforms

The tools designed to build your next product are now being used to build the perfect attack against it. Generative AI platforms can spin up a pixel-perfect replica of your brand's login page in minutes, launching high-fidelity phishing campaigns at a scale and speed that legacy security models cannot handle. This isn't an emerging threat; it's an industrialized phishing engine that’s already being weaponized against businesses.

Don't Guess What to Scan: Runtime Scope Ensures Full Production Coverage

Are you confident that you’re scanning for security vulnerabilities on all your software running in production? If this question makes you uncomfortable don’t worry. First, you’re not alone. Second – keep reading. Almost all security teams today face a massive challenge: they’re drowning in data but lack direction.