Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

AI, Platforms, Zero Trust, and Other Topics That Dominated RSA Conference 2024

Every year there’s quite a bit happening at the RSA Conference and no matter how hard you try, it can be difficult to take it all in. Between a sprawling showfloor with hundreds of vendors vying for attention, speaking sessions with experts from across the industry, private meetings with customers and prospects, plus social events in the evening, it’s understandable that you can come away with a bit of sensory overload.

Enhancing AWS Security: Comprehensive Strategies for Robust Cyber Protection

With the rapid expansion of cloud computing, Amazon Web Services (AWS) has become a cornerstone for businesses seeking scalable and flexible IT solutions. However, this increased reliance on AWS has made it a prime target for cyber threats. Ensuring robust security measures within AWS environments is paramount to safeguarding sensitive data and maintaining business continuity.

How Torq Hyperautomation Simplifies Phishing Analysis for SOC Teams

2023 went down in history as the worst year for phishing attacks on record, with nearly 35 million attempted business email compromise (BEC) attacks detected and investigated, according to the Microsoft Threat Intelligence Cyber Signals report. Unfortunately, phishing analysis is one of the most time-consuming tasks for the SOC. Responding to a phishing incident requires careful examination.

Building your own AI app? Here are 3 risks you need to know about-and how to mitigate them.

After the debut of ChatGPT, and the ensuing popularity of AI, many organizations are leveraging large language models (LLMs) to develop new AI-powered apps. Amidst this exciting wave of innovation, it’s essential for security teams, product managers, and developers to ensure that sensitive data doesn’t make its way into these apps during the model-building phase.

CrowdStrike Collaborates with NVIDIA to Redefine Cybersecurity for the Generative AI Era

Your business is in a race against modern adversaries — and legacy approaches to security simply do not work in blocking their evolving attacks. Fragmented point products are too slow and complex to deliver the threat detection and prevention capabilities required to stop today’s adversaries — whose breakout time is now measured in minutes — with precision and speed. As technologies change, threat actors are constantly refining their techniques to exploit them.

Leveraging AI-Powered Features to Combat Cybersecurity Threats in 2024

In 2024, the AI digital landscape has evolved considerably. We, at Parablu, work together to enhance our technology to keep pace with the changing digital world. Our focus remains on securing data from sophisticated cyber threats. In this blog, we’ll focus on AI and data security and how BluVault harnesses its capabilities for enterprise ransomware protection.

UniSuper's $125 Billion Cloud Catastrophe: Google's Accidental Deletion Reinforced the Importance of Backup Solution

The recent data loss incident involving UniSuper, a major financial player and Google Cloud serves as a reminder of the importance of implementing robust backup and disaster recovery solutions. Let’s delve into the details of the incident and explore why backups are essential for safeguarding against data disasters.

The Future of Work: Ensuring Holistic Security in Hybrid Environments

In today's rapidly evolving work culture, the shift towards hybrid environments demands a revolutionary approach to security. At Brivo, we're at the forefront of integrating cutting-edge technology to create not just safer, but smarter workspaces. Dive into our latest video where Mary Clark, a leading voice in security solutions, unveils the importance of a holistic, data-driven strategy to safeguard your hybrid workspace. From access control to employee well-being, discover how Brivo's innovative solutions are shaping the future of work.