Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

The Inevitable Threat: AI-Generated Email Attacks Delivered to Mailboxes

Generative AI exploded in popularity not too long ago but its influence on text and media creation is already undeniable. AI content is becoming ubiquitous on the internet, and this technology is slowly seeping into real life, impacting sectors such as healthcare, finance, agriculture, and education. In a previous blog post, we discussed the rise of malicious AI chatbots and how they can be leveraged in cyberattacks. Now, we are seeing these potentially AI-written spam being distributed via email.

Detect malware in your containers with Datadog Cloud Security Management

Detecting malware in container environments can be a major challenge due to the rapid development of malicious code, the proliferation of insecure container images, and the multilayered complexity of container stacks. Staying ahead of attackers means tracking the constant evolution of malware and rooting out threats in your codebase at the expense of considerable compute.

Cloud Unfiltered with Nick Eberts - Complexity of Fleet Management - Episode 6

Nick Eberts sits down with host Michael Chenetz to discuss platform engineering, fleet management and cloud-native security on this episode of Cloud Unfiltered. Outshift is Cisco’s incubation engine, innovating what's next and new for Cisco products and sharing our expertise on emerging technologies. Discover the latest on cloud native applications, cloud application security, generative AI, quantum networking and security, future-forward tech research, our latest open source projects and more.

Bipartisan AI Task Force and More - This Month in AI

In a significant move to address the complexities of regulating artificial intelligence (AI), Speaker Mike Johnson (R-La.) and Minority Leader Hakeem Jeffries (D-N.Y.) declared the formation of a bipartisan task force dedicated to exploring AI innovation and devising safeguards against potential threats. This initiative comes as lawmakers grapple with the rapid evolution of AI technology and its implications for various sectors.

Nightfall was built on AI. Here's how we're advancing our mission to scale data protection in the enterprise.

Back in 2018, Rohan and I founded Nightfall on the belief that AI could make data leak prevention (DLP) better, faster, and more accessible to every enterprise. At the time, Rohan was a founding engineer at Uber Eats, and I was an investor at Venrock specializing in SaaS and security. From these respective vantage points, we could see that legacy solutions weren’t working, and could never keep up with the evolving threat landscape.

Why misconfigurations continue to plague public cloud network services and how to avoid them?

Oren Amiram, Director of Product at AlgoSec, explains why misconfigurations continue to plague public cloud network services and how organizations can address these shortfalls with AlgoSec Cloud. Cloud security as a strategy is constantly evolving to meet the needs of organizations for scale, agility, and security. If your organization is weighing the merits of the use of public cloud versus private cloud, here are a few facts to keep in mind. Data shows that the public cloud is the preferred choice.

AI - Boon or Bane for Appsec

Are you ready to dive into the world of application security and artificial intelligence? Watch the exclusive talk by the renowned Julian Totzek Hallhuber, Solutions Architecture Manager at Veracode, during Mind the Sec 2023 in Brazil. In this engaging talk, Julian explores the advantages and disadvantages of using AI in the AppSec landscape and discovers how AI is revolutionizing the way we protect our applications from constantly evolving cyber threats.

5 Best Practices to Secure Azure Resources

Cloud computing has become the backbone for modern businesses due to its scalability, flexibility and cost-efficiency. As organizations choose cloud service providers to power their technological transformations, they must also properly secure their cloud environments to protect sensitive data, maintain privacy and comply with stringent regulatory requirements.

Understanding Denial of Service Attacks: Prevention and Response Strategies

Denial of service attacks pose a significant threat to online services, with the power to disrupt and disable critical operations. This guide uncovers the numerous tactics attackers use, the motivations behind their malicious activities, and provides actionable strategies to fortify your network against these insidious threats.