Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Breaking Boundaries: The Industry's First SSE Leader to Leverage Generative AI in SaaS Security

SaaS applications have fundamentally transformed business operations by enabling on-demand user access to services and data via the internet from anywhere. Yet, despite countless benefits, SaaS in the enterprise is fraught with cybersecurity challenges.

CVE-2024-3094 - Critical Backdoor Vulnerability In XZ Utils Open-Source Library

CVE-2024-3094 is a critical backdoor vulnerability found in the XZ Utils open-source library. The vulnerability was caused by a malicious code injected into the library by one of the maintainers. The vulnerability allows remote attackers to execute any desired code on systems with exposed SSH packages.

Unleash Your Startup's Potential with Microsoft Azure Cloud Computing

In the modern world with an intense digital culture, businesses of the newly created startup type face tremendous pressure to innovate fast and provide customers with innovative goods and services. Infrastructure construction and management is a time-consuming and expensive task. Microsoft Azure answers the trial by fire, providing a versatile cloud approximation platform targeted at startups’ peculiarities.

The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets

In an age where manufacturers have decided that just about every device needs to be “smart,” it’s becoming difficult to avoid the data collection and privacy invasion that are often baked into these devices. We have come to expect that smart phones and speakers with built-in digital assistants are always listening, and data collection practices between companies can vary significantly.

UK PSTI Act is a milestone for IoT security and passwords

The growth of Internet of Things (IoT) devices is reshaping our digital landscape. From smart thermostats to industrial sensors to IP cameras to smart toilets, these devices drive efficiency through innovation. But they aren’t secure by nature. A new UK law aims to make IoT products much more secure. On April 29, the UK’s Product Security and Telecommunications Infrastructure (PSTI) Act became official and is now enforcing compliance across IoT assets.

Dallas AI and Protecto.ai Announce Partnership

Protecto.ai alongside Dallas AI, the leading AI professional group in the Dallas-Fort Worth area, are excited to announce a partnership where Protecto will become an annual sponsor of Dallas AI. This collaboration aims to accelerate the development of secure and ethical AI technologies, while providing robust support to the local developer community through education, resources, and networking opportunities.

The Evolving Landscape of LLM Security Threats: Staying Ahead of the Curve

The rapid advancements in large language models (LLMs) have revolutionized how we interact with technology, powering various applications for different use cases. As the adoption of LLM-powered solutions continues to grow, so does the emergence of new and evolving security threats that aim to exploit these robust AI systems.

Privacy vs. Mobile Security: Why You Don't Have to Choose

When it comes to how employees get work done, personal devices are an ever-growing part of the equation. The 2023 Lookout State of Remote Work Security Report found that 92% of remote workers have performed work tasks on their personal mobile devices. While putting security controls on employer-owned devices is a no-brainer, the increasing overlap of personal with professional means that organizations need to think about how to secure employee-owned devices that are being used for work.