Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Navigating the AI-powered development era in financial services

Australian and New Zealand financial service institutions (FSIs) are facing pressure to innovate quickly while maintaining robust security and regulatory compliance. Many, like ANZ Bank and Commonwealth Bank, are exploring Generative AI to accelerate software development, but is it a silver bullet?

Essential Features to Look for in a Data Management as a Service Solution

Today, organizations face more data than ever. Efficient data management is vital for success and compliance. This is where Data Management as a Service (DMaaS) steps in. These data service solutions simplify data management. They allow businesses to manage data without big in-house setups. However, choosing the right DMaaS solution can be tricky. So, what should you look for? Here are the key features.

Response Accuracy Retention Index (RARI) - Evaluating Impact of Data Masking on LLM Response

As language models (LLMs) in enterprise applications continue to grow, ensuring data privacy while maintaining response accuracy becomes crucial. One of the primary methods for protecting sensitive information is data masking. However, this process can lead to significant information loss, potentially rendering responses from LLMs less accurate. How can this loss be measured?

Advanced Android Malware Targets NFC Data for ATM Cashouts

A new strain of Android malware has emerged, targeting victims' card details and utilizing near-field communication (NFC) technology to facilitate unauthorized ATM withdrawals. This sophisticated crimeware, active since March 2024, has already impacted customers of three major Czech banks.

Deceptive AI: A New Wave of Cyber Threats

As artificial intelligence (AI) technology advances, its influence on social media has become more and more pervasive and riddled with challenges. In particular, the ability for humans to discern genuine content from AI-generated material. Our recent survey conducted with OnePoll on over 2,000 UK workers found that a substantial portion of social media users are struggling to navigate this new digital frontier.

Cloud Security And Privacy: Best Practices To Mitigate The Risks

Cloud security refers to technologies, best practices, and safety guidelines that help to protect your data from human errors, insider and security threats. Therefore, it naturally covers a wide range of procedures, which are aimed at securing systems from data breaches, data loss, unauthorized access, and other cybersecurity-related risks that are growing from year to year.

The Hidden Dangers of Zombie and Shadow APIs-and Why Only Salt Security Can Tackle Them

In today’s hyper-connected digital landscape, APIs are the lifeblood of innovation, powering everything from customer experiences to internal operations. However, with this growing reliance on APIs comes a dark side—zombie and shadow APIs. These hidden, forgotten, or undocumented endpoints present significant security risks that traditional approaches simply can’t address.

Elastic AI Assistant and Attack Discovery integrate with Google Vertex AI to help drive further AI adoption

AI-driven security analytics reduces analyst burnout Most SIEM technologies in today’s market have not kept up with the pace of innovation and place a heavy burden on security analysts to perform manual, labor-intensive tasks in order to maintain defenses. Generative AI is helping security professionals address today’s dynamic threat landscape and prepare for future threats.