Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Cyber Week: Analyzing Internet traffic and e-commerce trends

Throughout the year, special events lead to changes in Internet traffic. We observed this with Thanksgiving in the US last week, where traffic dipped, and during periods like Black Friday (November 24, 2023) and Cyber Monday (November 27, 2023), where traffic spiked. But how significant are these Cyber Week days on the Internet? Is it a global phenomenon? Does e-commerce interest peak on Black Friday or Cyber Monday, and are attacks increasing during this time?

AI Integration Dilemma: Cost Challenges for Small Businesses vs. Power Play of Tech Giants #podcast

In this insightful video, we delve into the complex landscape of AI integration and its potential cost barriers for smaller organizations. The good news? When it comes to chatbots (CHT), leveraging data access APIs and seamless integration doesn't necessarily mean breaking the bank on AI engine costs. You pay for what matters – the data journey to their APIs.

AI-driven Analytics for IoT: Extracting Value from Data Deluge

The Internet of Things (IoT) is a network of physical devices, vehicles, and buildings that are embedded with electronics, software, sensors, and network connectivity to enable them to collect and exchange data. The IoT is expected to grow from $735 billion in 2020 to $1.6 trillion by 2025. This rapid growth has created enormous amounts of data from various sources within the IoT ecosystem. As the volume and velocity of data generated increases exponentially every day, organizations need to develop new ways to extract insights in order to gain competitive advantage over their competitors or improve their customer experiences.

AI-Powered MVP Development in 2024

With the introduction of artificial intelligence (AI) into the Minimum Viable Product (MVP) development process, the field of product development is undergoing a radical change. AI-driven MVP development automates processes, offers deeper user insights, facilitates user-centric prototypes, and revolutionizes how businesses realize their creative ideas. This essay explores the field of AI-powered MVP Development in 2024, going over the essentials of AI-driven prototypes, the frameworks and tools that facilitate it, and the cutting-edge AI developments that are changing the game.

Panoptica API Security - Introducing AWS API Gateway Support

Introducing AWS API Gateway support in Cisco Panoptica for your security your application’s API communications. This video introduces the gateway support and showcases a few key API security risks that Panoptica can identify in your environment. Outshift is Cisco’s incubation engine, innovating what's next and new for Cisco products and sharing our expertise on emerging technologies. Discover the latest on cloud native applications, cloud application security, generative AI, quantum networking and security, future-forward tech research, our latest open source projects and more.

Mitigate infrastructure vulnerabilities with Datadog Cloud Security Management

Cloud environments comprise hundreds of thousands of individual components, from infrastructure-level containers and hosts to access-level user and cloud accounts. With this level of complexity, continuous and end-to-end visibility into your environment is vital for detecting, prioritizing, and fixing vulnerabilities before attackers can take advantage of them.

Top 5 Open Source Security Risks IT Leaders Must Know

Lurking in the open source software (OSS) that pervades applications around the world are open source security risks technology leaders must be aware of. Software is one of technology’s most vulnerable subsets with over 70% of applications containing security flaws. Here are the open source security risks IT leaders must be aware of to protect technology and help it scale safely.

Making the cloud the safest place to compute: Sumo Logic Cloud Infrastructure Security for AWS

The landscape of cloud computing has evolved significantly over the years, transforming how businesses operate and innovate. This transformation has brought new challenges, especially in security. The growing adoption of cloud services, microservices architecture, and the shared responsibility model of cloud vendors has ushered in a need for robust security solutions that consolidate risk and threat data across cloud environments.

The Two Sides of ChatGPT: Helping MDR Detect Blind Spots While Bolstering the Phishing Threat

ChatGPT is proving to be something of a double-edged sword when it comes to cybersecurity. Threat actors employ it to craft realistic phishing emails more quickly, while white hats use large language models (LLMs) like ChatGPT to help gather intelligence, sift through logs, and more. The trouble is it takes significant know-how for a security team to use ChatGPT to good effect, while it takes just a few semi-knowledgeable hackers to craft ever more realistic phishing emails.

STEP Program with Bright Security: DAST Solutions and API Testing

We’re all in this together, which is why awareness about APIs and connecting with one another is crucial to cyber security. Salt Security has recently announced our Salt Technical Ecosystem Partner Program which can help demonstrate the role of application security testing when it comes to API security and where it fits in a good API security program.