Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Are Managed SASE Offerings the Wave of the Future? A Roundtable Discussion with GSI's & SP's

Organizations quickly adapted when they needed to suddenly support hybrid and remote workforces, often in inefficient and unsustainable ways. New technologies and new managed services can now help companies realize the full potential of SASE. In this roundtable discussion, you'll hear leading System Integrators and Service Providers talk about their clients’ top challenges and use cases, how that’s changed over the past three years, and where they see networking and security evolving over the coming years.

Cybersecurity Expert: AI Lends Phishing Plausibility for Bad Actors

Cybersecurity experts expect to see threat actors increasingly make use of AI tools to craft convincing social engineering attacks, according to Eric Geller at the Messenger. “One of AI’s biggest advantages is that it can write complete and coherent English sentences,” Geller writes. “Most hackers aren’t native English speakers, so their messages often contain awkward phrasing, grammatical errors and strange punctuation.

How Executive Order on Artificial Intelligence Addresses Cybersecurity Risk

Unlike in the 1800s when a safety brake increased the public’s acceptance of elevators, artificial intelligence (AI) was accepted by the public much before guardrails came to be. “ChatGPT had 1 million users within the first five days of being available,” shares Forbes.

Unlock the Power of Quality Data in AI: Data Cleaning for Enhanced Accuracy and Output

In the fast-paced world of AI, data quality is paramount. To harness the full potential of your AI models, you need top-notch data. This means not just grabbing web pages with all the HTML, CSS, and JavaScript source code intact. Instead, you'll want to strip away the extraneous and retain only the critical information that's essential for training your AI. Leaving unnecessary code in the mix can have a detrimental impact, affecting both accuracy and the quality of the AI's output.

The Cloud is Just Someone Else's Computer and They're Doing Things with it that You Need to Know

In this webinar, Netskope Chief Platform Officer, Joe DePalo, wades through the marketing hype, false claims and outdated approaches that cripple many clouds. Designed specifically for networking, infrastructure and operations leaders, Joe shares the most critical questions to ask your cloud providers. This webinar is particularly timely considering the shift to SASE and the convergence of security and networking.

Unpacking the new US executive order on artificial intelligence

On Monday, October 30, President Biden signed the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence — the longest in history at 117 pages. The executive order (EO) aims to advance and regulate artificial intelligence (AI) in the US. This landmark order pulls together a number of priorities that influence not just the AI industry, but also society at large.

Secure cloud-native apps and APIs at the speed your business demands

The cloud-native development model entered the mainstream in recent years, with technologies such as microservices and serverless computing, containers, APIs, and infrastructure-as-code (IaC) at the forefront of this trend. Thanks to these emerging technologies, organizations can build and run their apps fast, in a distributed manner, and without reliance on physical hardware infrastructures.

Using a Password Manager When Changing iPhones

You should use a password manager when upgrading to a new iPhone because it will make transferring all your account credentials more seamless and you’ll be able to update any weak passwords, making your accounts more secure. Although Apple provides a built-in password manager, iCloud Keychain is not as safe as using a dedicated password manager. A password manager offers more security and convenience to store, manage and share your personal information.