Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Why Your Business Needs a Robust IoT Security Framework

In a digital landscape teeming with possibilities, safeguarding your business with a robust Internet of Things security framework is paramount. From interconnected devices to data privacy concerns, the stakes are high. Let’s delve into the realm of IoT security and unveil the crucial reasons behind fortifying your business against evolving cyber threats.

The IT Hour | SME IT Trends 07.19.24

Chase Doelling, Principal Strategist, will join to give a sneak peek of our biannual SME IT Trends survey. Be the first group to see what's in store! Join us at 11:30 am ET The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable.

A guide to the OWASP TOP 10 for large language model applications

Attackers are increasingly targeting vulnerabilities within large language models (LLMs) used to recognise and generate text. In response to the growing risk, the recently launched OWASP Top 10 for LLMs covers the key vulnerabilities within these types of AI applications. Read our guide to learn more about the most critical vulnerabilities and how to reduce AI security risks.

What is Personally Identifiable Information (PII)?

Personally Identifiable Information (PII) encompasses data that uniquely identifies an individual. Examples of PII include direct identifiers like full names, social security numbers, driver's license numbers, and indirect identifiers such as date of birth, email and IP addresses. The precise nature of PII can vary depending on the context and jurisdiction, but its defining characteristic is its ability to single out a specific person.

Security Made Easy: Mobile Security Purpose-Built for MSPs

Mobile devices are now an integral part of the way we work, and because of that, mobile security has become a necessity when it comes to protecting an organization’s data. Yet with many IT and security teams already stretched to the limit, the task of incorporating mobile security into their existing operations may seem like an impossible task.

Privacy vs. Mobile Security: Why MSPs Don't Have to Choose

When it comes to how employees get work done, personal devices are an ever-growing part of the equation. The 2023 Lookout State of Remote Work Security Report found that 92% of remote workers have performed work tasks on their personal mobile devices. While putting security controls on employer-owned devices is a no-brainer, the increasing overlap of personal with professional means that organizations need to think about how to secure employee-owned devices that are being used for work.

Two of Wallarm's Open-source Tools Have Been Accepted into Black Hat Arsenal 2024

We're gearing up with some seriously cool stuff for Black Hat! But first, a little sneak peek - not just one, but TWO of Wallarm's open-source tools will be featured in the Arsenal showcase at Black Hat USA this year. Black Hat Arsenal unites researchers and the open-source community to display their newest open-source tools and products, allowing presenters to engage directly with attendees. Its schedule is now live, so save the date to watch presentations of API Firewall and GoTestWAF.