Security News

5 Reasons Why IT Security Tools Don't Work For OT
2023-06-06 11:44

The landscape of OT security tools is far less developed than its information technology counterpart. With OT systems opening to the world and cyberthreats surging, the lack of OT-specific security tools has emerged as an urgent problem.

Taking the art of email security to the next level
2023-06-06 08:28

You might imagine from the considerable number of email security tools on the market that the problem is being kept relatively in check, but you'd be wrong. Too many existing email security tools are based around analysis of historical attack data, so can only spot what they've seen before.

Leveraging large language models (LLMs) for corporate security and privacy
2023-06-06 04:30

The intersection of LLMs with corporate security and privacy warrants a deeper dive. Techniques like differential privacy can ensure that LLMs learn from data without exposing individual information.

GIGABYTE releases new firmware to fix recently disclosed security flaws
2023-06-05 15:09

GIGABYTE has released firmware updates to fix security vulnerabilities in over 270 motherboards that could be exploited to install malware. The firmware updates were released last Thursday in response to a report by hardware security company Eclypsium, who found flaws in a legitimate GIGABYTE feature used to install a software auto-update application in Windows.

The Annual Report: 2024 Plans and Priorities for SaaS Security
2023-06-05 11:55

Over 55% of security executives report that they have experienced a SaaS security incident in the past two years - ranging from data leaks and data breaches to SaaS ransomware and malicious apps. The SaaS Security Survey Report: Plans and Priorities for 2024, developed by CSA in conjunction with Adaptive Shield, dives into these SaaS security incidents and more.

Katie Boswell on AI security and women’s rise in cybersecurity
2023-06-05 02:45

As a leading voice in AI security, Katie shed some light on how encouraging women to join the cybersecurity revolution today is helping secure the products of tomorrow. One thing is clear, the growing popularity of AI requires the product security world to make even more adjustments to their security strategies, including looking for new ways to recruit rising young men and women who can address the challenges of tomorrow.

Cloud Security Tops Concerns for Cybersecurity Leaders: EC-Council's Certified CISO Hall of Fame Report 2023
2023-06-03 08:10

A survey of global cybersecurity leaders through the 2023 Certified CISO Hall of Fame Report commissioned by the EC-Council identified 4 primary areas of grave concern: cloud security, data security, security governance, and lack of cybersecurity talent. EC-Council, the global leader in cybersecurity education and training, released its Certified Chief Information Security Officer Hall of Fame Report today, honoring the top 50 Certified CISOs globally.

Improve your app security on Azure
2023-06-02 17:01

Azure Virtual Network Manager is a new tool for grouping network resources, configuring the connectivity and security for those resources and deploying those configurations to the right network groups automatically. You can use this to create common network topologies like a hub and spoke that connects multiple virtual networks to the hub virtual network that contains your Azure Firewall or ExpressRoute connection.

The Importance of Managing Your Data Security Posture
2023-06-02 10:16

As new data security posture management solutions come to market, organizations are increasingly recognizing the opportunity to provide evidence-based security that proves how their data is being protected. There certainly is a lot being marketed and published about data security posture management solutions themselves, but we first wanted to dig into what is data security posture?

Checklist: Network and systems security
2023-06-01 16:00

Cybersecurity demands and the stakes of failing to properly secure systems and networks are high. While every organization's specific security needs form a unique and complex blend of interconnected requirements, numerous security fundamentals almost always apply to each of these groups.