Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

The Debut of the Industry-First API Security Posture Management Engine

Today, we’re thrilled to share that Salt has launched extended capabilities to our powerful platform, adding yet another industry-first technical advancement to our trophy case! (full announcement here.) Since its founding, Salt’s been on a mission to create a platform that can detect, prioritize and solve the most complex API security challenges and risks.

Integrating JFrog Artifactory with Amazon SageMaker

Today, we’re excited to announce a new integration with Amazon SageMaker! SageMaker helps companies build, train, and deploy machine learning (ML) models for any use case with fully managed infrastructure, tools, and workflows. By leveraging JFrog Artifactory and Amazon SageMaker together, ML models can be delivered alongside all other software development components in a modern DevSecOps workflow, making each model immutable, traceable, secure, and validated as it matures for release.

Red Teaming in the Cloud: A Shift in Perspective

Cloud adoption is exploding, and rightfully so. Businesses are seeing the value of improved agility and efficiency when leveraging public cloud, resulting in 60% of all corporate data globally being stored in the cloud in 2022. As such, securing the cloud is becoming an increasingly important skill for defensive security teams, ergo red teaming the cloud is becoming increasingly important for us offensive security teams too.

AI and digital twins: A roadmap for future-proofing cybersecurity

Keeping up with threats is an ongoing problem in the constantly changing field of cybersecurity. The integration of artificial intelligence (AI) into cybersecurity is emerging as a vital roadmap for future-proofing cybersecurity, especially as organizations depend more and more on digital twins to mimic and optimize their physical counterparts.

The Road Ahead: What Awaits in the Era of AI-Powered Cyberthreats?

Artificial intelligence (AI) is rapidly infiltrating the business world and our daily lives. While revolutionizing how – and how efficiently – work gets done, it also introduces a new set of cybersecurity challenges. In response to the evolving, AI-shaped threat landscape, I foresee organizations adopting robust countermeasures.

Ethical Crossroads in AI: Unveiling Global Perspectives| Navigating the Dark Side of Technology

Dive into the intricate web of ethical dilemmas in AI development with me in this thought-provoking video. As we tread through the current phase of AI evolution, I explore the intrinsic differences in moralities and ethics between the East, West, South, and North. Delving into the darker side of humanity, we confront the potential misuse of advanced technology. Join the conversation as we revisit the debate on the consequences of good AI falling into the wrong hands. The looming question of a clash between ethical AI and malicious use is on the horizon, and it could escalate swiftly.

2024 IT Predictions: What to Make of AI, Cloud, and Cyber Resiliency

The future is notoriously hard to see coming. In the 1997 sci-fi classic Men in Black — bet you didn’t see that reference coming — a movie about extraterrestrials living amongst us and the secret organization that monitors them, the character Kay, played by the great Tommy Lee Jones, sums up this reality perfectly: While vistors from distant galaxies have yet to make first contact — or have they? — his point stands.

Navigating the Cloud Misconfiguration Maze: A Cybersecurity Odyssey

Imagine a world where digital fortresses are impervious to cyber threats – a utopia for any cybersecurity professional. Yet, we live in a realm where one misstep in cloud configurations opens the gates to potential havoc. As someone who has journeyed through the labyrinth of cybersecurity for over two decades, I've witnessed firsthand how a simple misconfiguration can escalate from a minor hiccup to a full-blown security nightmare.