Please turn on your JavaScript for this page to function normally.
Eye
How advances in AI are impacting business cybersecurity

While ChatGPT and Bard have proven to be valuable tools for developers, marketers, and consumers, they also carry the risk of unintentionally exposing sensitive and …

patch Tuesday
March 2024 Patch Tuesday forecast: A popular framework updated

UPDATE: March 12, 3:55 PM ET – March 2024 Patch Tuesday: Microsoft fixes critical bugs in Windows Hyper-V We’re almost at our third Patch Tuesday and wrapping up the …

API
5 ways to keep API integrations secure

API integrations often handle sensitive data, such as employees’ personally identifiable information (PII), companies’ financial information, or even clients’ payment card …

lock
Why cyber maturity assessment should become standard practice

Understanding risk is one thing, but how do you know if your organization has what it takes to withstand those risks being realized? Establishing cyber maturity can help …

scanning
Using AI to reduce false positives in secrets scanners

As development environments grow more complex, applications increasingly communicate with many external services. When a software development project communicates with an …

No Excel
It’s time for security operations to ditch Excel

Security teams are hiding an embarrassing secret from the outside world: despite their position at the vanguard of technology, security risks and threats, their actual war …

AI
A step-by-step plan for safe use of GenAI models for software development

If you are a large-scale company, the recent AI boom hasn’t escaped your notice. Today AI is assisting in a large array of development-related and digital-related tasks, from …

Securities and Exchange Commission
How to make sense of the new SEC cyber risk disclosure rules

SEC’s new cybersecurity risk management, strategy, governance, and incident disclosure rules, which require increased transparency around cybersecurity incidents, have been in …

biometrics
Balancing “super app” ambitions with privacy

When Elon Musk’s ambitions to transform X into an “everything app” were divulged last year, he joined several companies known to be exploring or actively working on developing …

DMARC
Gmail & Yahoo DMARC rollout: When cyber compliance gives a competitive edge

The essence of cybersecurity is not just about defense but enabling business through trust and reliability. As Gmail and Yahoo take steps to enforce stricter email …

brain
AI outsourcing: A strategic guide to managing third-party risks

In an era of artificial intelligence (AI) revolutionizing business practices, many companies are turning to third-party AI services for a competitive edge. However, this …

mental health
We can’t risk losing staff to alert fatigue

The oft-quoted Chinese military strategist Sun Tzu famously claimed: “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” Exchange …

Don't miss

Cybersecurity news