Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

PCI DSS v4.0: What You Need to Know and What the End of v3.2.1 Means for the Future of Digital Payments

On March 31st, 2024, The Payments Card Industry Standards Security Council (PCI SSC) officially retired version 3.2.1 of the PCI Data Security Standard (PCI DSS) with the publication of its new sets of protocols and security standards for v4.0. With the continued rise in cyber threats against financial services and institutions, PCI DSS v4.0 supersedes version 3.2.1 to tackle evolving threats and technologies, facilitating enhanced approaches to counteract emerging types of cyber attacks.

Hallucinated Packages, Malicious AI Models, and Insecure AI-Generated Code

AI promises many advantages when it comes to application development. But it’s also giving threat actors plenty of advantages, too. It’s always important to remember that AI models can produce a lot of garbage that is really convincing—and so can attackers. “Dark” AI models can be used to purposely write malicious code, but in this blog, we’ll discuss three other distinct ways using AI models can lead to attacks.

Expanding the Vanta API to connect auditor tools

Vanta has helped auditors automate and simplify thousands of compliance audits, and we’re now making the process even easier. Today we’re excited to share that we’ve added new endpoints for auditor tools to the Vanta API, leading to a better collaboration experience for auditors and customers. ‍ With our new API endpoints, audit partners can integrate their tools with Vanta, allowing them to work in their preferred systems.

The Future Of AI At Arctic Wolf

Arctic Wolf is addressing the exponential scale of security threats to business worldwide with our fusion of human intelligence, artificial intelligence, and one of the world’s largest data-streams of security observations. Join Arctic Wolf’s Dan Schiappa, Chief Product Officer, and Ian McShane, Vice President of Product, as they share their vision for AI in the context of the industry-leading Arctic Wolf Security Operations Cloud.

4 Examples of How AI is Being Used to Improve Cybersecurity

Throughout history, technology has been a catalyst for solving many civilizational problems. The advent of artificial intelligence (AI) presents an incredible opportunity to combat cybersecurity risks and bolster the defenses of organizational IT networks. The good news is that it’s already making an impact by reducing the average dwell time of cyber attacks by as much as 15%. But AI holds much more promise.

Quick start guide for using Calico policies for Calico Open Source users

Calico policies are a way to enforce network security at the pod level. This blog post will provide a comprehensive overview of Calico policies for Calico OS (Open Source) users. We will cover the basics of Calico policies, including what they are, how they work, and how to use them. We will also provide best practices for using Calico policies and examples of how they can be used in real-world scenarios.

Extend Attack Surface Visibility to AWS, GCP, and Azure with Bitsight

Bitsight excels at using externally available data to paint a detailed picture of organizations’ digital footprint, including assets, organizational hierarchy, third-party relationships, and risk posture. But as more IT resources shift to cloud service providers, gaining complete and precise visibility into your external attack surface becomes increasingly complex.

New Secrets Management Capabilities: CyberArk Secrets Hub, CyberArk Conjur Cloud, CyberArk Conjur Enterprise, CyberArk Credential Providers

We’re excited about several new Secrets Management capabilities that we announced at IMPACT 24 in Nashville and around the globe on the IMPACT World Tour. These include CyberArk Conjur Cloud support for Self-hosted PAM, CyberArk Secrets Hub support for Google Cloud and dramatic performance improvements for the Credential Providers with Release 14. AWS also demonstrated their new ”Managed By CyberArk“ capability in the AWS Secrets Manger UI.

Protecto.ai and Fiddler AI Announce Strategic Collaboration for Responsible AI Development

Protecto.ai is thrilled to announce a strategic collaboration with Fiddler AI, a trailblazer in AI explainability and transparency. With a total of $47 million in funding, Fiddler AI empowers organizations to build trust in their AI systems by making complex models interpretable and transparent, thereby enhancing model performance and ensuring compliance with regulatory standards and ethical guidelines.