Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Executive Order (EO) 14110: Safe, Secure & Trustworthy AI

More news about Artificial Intelligence (AI)? We know. It’s hard to avoid the chatter — and that’s for good reason. The rise of AI has many people excited for things to come. But many others are, quite understandably, concerned about the ethical implications of this powerful technology. Fortunately, the Biden Administration is working to address the concerns of the American people by governing the development and use of AI.

Strengthen Your Identity Security: CyberArk's Integration with AWS

In today's digital landscape, safeguarding identities is paramount. CyberArk's integration with diverse AWS technologies fortifies your defense against identity-focused threats. This collaboration empowers organizations to bolster their Identity Security strategies, thwart attacks, and ensure seamless, secure user experiences throughout the enterprise. Discover how CyberArk and AWS combine forces to elevate your security measures and protect against evolving cyber risks. Dive into this insightful video to learn more about this powerful partnership and safeguard your digital identities effectively.

Five Questions Security Teams Need to Ask to Use Generative AI Responsibly

Since announcing Charlotte AI, we’ve engaged with many customers to show how this transformational technology will unlock greater speed and value for security teams and expand their arsenal in the fight against modern adversaries. Customer reception has been overwhelmingly positive as organizations see how Charlotte AI will make their teams faster, more productive and learn new skills, which is critical to beat the adversaries in the emerging generative AI arms race.

How to Achieve and Maintain AWS Compliance

For many organizations, the transition to the cloud for data storage is inevitable. Whether shifting operations entirely to a cloud environment or modernizing your systems using cloud-based applications, you must choose the best cloud computing platform with the best cloud security for your compliance program.

Microsoft Copilot Studio Vulnerabilities: Explained

Last week, Michael Bargury and the team at Zenity published a video summarizing 6 vulnerabilities that are found in Microsoft Copilot Studio. The video highlights, in sequence, a myriad of ways that business users can create their own AI Copilots that are risky, why they are risky, and how they can be easily exploited. While I highly recommend checking out the video, this blog sets out to provide a look at why these vulnerabilities matter, and what considerations should be taken to mitigate them.

What Are the Benefits of Cloud Adoption in Insurance?

The rise of cloud computing has been one of the most transformative technologies of the past several decades. According to research firm Gartner, public cloud services spending will increase from $313 billion in 2020 to $482 billion in 2022. Further, by 2026, it will exceed 45 percent of all enterprise IT spending, up from less than 17 percent in 2021. There’s no doubt that cloud adoption will continue to increase.

Integrating Turnstile with the Cloudflare WAF to challenge fetch requests

Two months ago, we made Cloudflare Turnstile generally available — giving website owners everywhere an easy way to fend off bots, without ever issuing a CAPTCHA. Turnstile allows any website owner to embed a frustration-free Cloudflare challenge on their website with a simple code snippet, making it easy to help ensure that only human traffic makes it through.

LLMs, Quantum Computing, and the Top Challenges for CISOs in 2024

Amidst the ongoing surge in cyber threats, CISOs are encountering increasing challenges in their responsibilities. During a recent CISO Panel Discussion on Application Security hosted by our CEO, Ashish Tandan, CISOs Kiran Belsekar from Aegon Life and Manoj Srivastava from Future Generali expressed concerns about managing security postures and shared actionable strategies to tackle evolving threats.