open, open source, AI, generative, runtime, software, security,

Key Areas Where Open-Source Security Needs to Evolve

|
Cybersecurity experts agree open-source software (OSS) needs to evolve in some key areas, both concerning how organizations govern the OSS they consume and how the projects themselves are sustained. The software industry has been leveraging open-source software for decades now, and to great effect. It’s estimated that 80% of modern ... Read More
Security Boulevard
device security

The State of Open Source Cloud-Native Security

As 2024 kicks off, here's where cloud-native supply chain security stands and what to expect in the immediate future ... Read More
Security Boulevard
Orca Security attacks incident response security MDR Incident Response Plan

Using ML to Accelerate Incident Management

If adopted correctly, AI and ML could advance incident response efforts by spotting errors and vulnerabilities, communicating issues and improving defensive postures ... Read More
Security Boulevard
OWASP cybersecurity Vendor Risk Management: The Secret Ingredient

OWASP Updates Top 10 API Security Risks

OWASP recently updated its API Security Top 10, which describes the top risks inherent in insecure APIs ... Read More
Security Boulevard
FireEye Infuses Machine Learning

Reviewing the OWASP Machine Learning Top 10 Risks

The OWASP Machine Learning Security Top 10 analyzes the most common vulnerabilities associated with machine learning ... Read More
Security Boulevard
CISOs, risk, CISO, LLMs AI language diversity hiring

Understanding the OWASP Top 10 for LLMs

The OWASP Top 10 for LLM Applications draft provides a comprehensive review of the AppSec challenges within LLM development ... Read More
Security Boulevard
Traceable AI, API security, APIs, Wallarm, Akamai, APIs, API security, threat modeling, ICS, VPNs, APIs, risk, left-of-bang, threats, vulnerabilities, XDR, zero-trust, attack, XDR API Skyhawk Security modeling threat CosmicStrand insider threats Threat Modeling - Secure Coding - Cybersecurity - Security

Why Generative AI is a Threat to API Security

Generative AI can be used to amplify cybercriminals' nefarious deeds against web applications, especially those that rely heavily on APIs ... Read More
Security Boulevard
ransomware

How to Strengthen Cybersecurity in the Age of AI

To get ahead of the adversaries in this new AI age, cybersecurity research into new generative AI attacks and defenses must be further along ... Read More
Security Boulevard
Sysdig, cloud identity, cybersecurity Sysdig internet, security, cloud internet, vulnerabilites, organizations, DNSSEC, GoDaddy cloud network, security

Comparing Cloud Providers’ Shared Responsibility Models

More and more enterprises are becoming multi-cloud. And when evaluating cloud service providers (CSPs) for different needs, one important factor is security. Yet, CSPs aren’t responsible for securing everything—depending on the component in question, you may be left on your own to ensure it’s adequately safeguarded in the cloud. Thus, ... Read More
Security Boulevard
DBIR Log4j Breach Discovery Takes 197 Days

70% of US IT Leaders Told Not to Disclose Data Breaches

Not all cybersecurity breaches get reported. A new report from Bitdefender found that although IT leaders have an obligation to report attacks, over 42% of them have been told to keep quiet when a breach should have been reported. Shockingly, in the U.S., this number rises to 70.7%. IT leaders ... Read More
Security Boulevard
Loading...