Security News

Human risk is the top cyber threat for IT teams
2024-04-03 03:30

After another year rife with cybercrime, IT and cyber leaders are confronted with a new reality. AI and deepfakes can trick even the most well-trained employee, and executing a strong cyber defense is more important than ever.

How threat intelligence data maximizes business operations
2024-03-26 05:00

Threat intelligence is no longer a 'nice to have' for organizations but a 'must,' as it provides leaders with critical insight into their business. If leveraged correctly, threat intelligence is not just a cybersecurity asset but also gives organizations a new approach to maximizing operations and making more effective business decisions.

Shadow AI is the latest cybersecurity threat you need to prepare for
2024-03-22 06:00

Similarly to shadow IT, shadow AI refers to all the AI-enabled products and platforms being used within your organization that those departments don't know about. Establishing a risk matrix for AI use within your organization and defining how it will be used will allow you to have productive conversations around AI usage for the entire business.

Malware stands out as the fastest-growing threat of 2024
2024-03-21 04:00

Malware stands out as the fastest-growing threat of 2024, with 41% of enterprises witnessing a malware attack in the past year - closely followed by phishing and ransomware. The research found that 43% of enterprises failed a compliance audit in the past twelve months - with the report highlighting a very clear correlation between compliance and data security.

How the New NIST 2.0 Guidelines Help Detect SaaS Threats
2024-03-18 13:51

Throughout CSF 2.0, NIST recommendations dovetail with SaaS security needs. Read about how to apply the NIST 2.0 guidelines to your SaaS stack.

Researchers Highlight Google's Gemini AI Susceptibility to LLM Threats
2024-03-13 10:14

Google's Gemini large language model (LLM) is susceptible to security threats that could cause it to divulge system prompts, generate harmful content, and carry out indirect injection attacks. The...

CTEM 101 - Go Beyond Vulnerability Management with Continuous Threat Exposure Management
2024-03-12 11:07

In a world of ever-expanding jargon, adding another FLA (Four-Letter Acronym) to your glossary might seem like the last thing you’d want to do. But if you are looking for ways to continuously...

BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks
2024-03-11 09:53

The threat actors behind the BianLian ransomware have been observed exploiting security flaws in JetBrains TeamCity software to conduct their extortion-only attacks. According to a new report from...

Insider threats can damage even the most secure organizations
2024-03-11 04:00

Insider threats encompass both intentional and unintentional actions. The challenge for organizations is not only to detect and mitigate malicious insider activities but also to cultivate a culture of security awareness and proactive risk management across all levels of the workforce.

How new and old security threats keep persisting
2024-03-08 06:00

Security leaders recognize that the pattern of buying new tech and the frantic state of find-fix vulnerability management is not working, according to Cymulate. Rather than waiting for the next big cyberattack and hoping they have the right defenses in place, security leaders are now more than ever implementing a proactive approach to cybersecurity by taking action to identify and address security gaps before attackers find and exploit them.