Governance, Risk & Compliance
Salt Security Adds Governance Engine to API Security Platform
Michael Vizard | | api, API security, Application Security, Compliance, governance, risk, Salt Security
Salt Security added a posture governance engine to its API security platform that defines and enforces implementation standards ...
Security Boulevard
AI’s Role in Cybersecurity for Attackers and Defenders in 2024
Matt Wiseman | | AI, Artificial Intelligence, Authentication, Cybersecurity, Data Privacy, executive order, Phishing, threat detection, threat response, Vulnerability Management
As AI becomes available and robust, malicious actors have already used it to develop more advanced attack methods; defenders must also leverage AI in 2024 ...
Security Boulevard
OpenAI: We’ll Stop GPT Misuse for Election Misinfo
Richi Jennings | | 2024 presidential election, AI, Biden, Chat GPT, ChatGPT, chatgpt injection, cybersecurity risks of generative ai, DALL-E, Deep Fake, Deep Fakery, Deep fakes, deepfake, deepfake attacks, Deepfake Detection, Deepfake security threats, Deepfake Technology, deepfake videos, deepfakes, Democracy, Democracy-2024, Donald Trump, election, election cybersecurity, election influence, Election Infosecurity, Election Manipulation, generative AI, Generative AI risks, GPT, GPT-3, GPT-4, Joe Biden, Misinformation, OpenAI, SB Blogwatch, Trump
Guardrails Prevent Trouble? Sam says avoid AI abuse—protect the democratic process ...
Security Boulevard
The Evolving Threat Landscape: Where Out-of-Band Communications Fit – Part One
Navroop Mitter | | cyberattack, Cybersecurity, Incident Response, out-of-band communications, Threat, Threat Intelligence
Out-of-band communication is a necessity to prohibit outsiders from observing internal incident response activities or taunting response teams ...
Security Boulevard
Now you can easily gain comprehensive insights into your compliance posture
With our new Compliance Matrix feature, it takes just a few simple steps to get full visibility into your organization's compliance posture across all applications ...
Seizing Opportunities: How Can Marketers Leverage Data Privacy for Success
Data privacy is one of the most essential aspects of data security. With stringent data privacy laws all around the world, marketers are finding it challenging to navigate through this new framework ...
Stupid Human Tricks: Top 10 Cybercrime Cases of 2023
Mark Rasch examines 2023 cybercrime cases that appear to be the most impactful—not the most extensive or expensive—just the most “interesting.” ...
Security Boulevard
FCC Asks Carmakers, Carriers How They’re Protecting Abuse Survivors
The Federal Communications Commission is pressing automakers and wireless service providers to say how they are protecting victims of domestic violence from being stalked by their abusers through the connected devices in ...
Security Boulevard
Ivanti VPN Zero-Day Combo Chained ‘by China’
Richi Jennings | | CVE-2023-46805, CVE-2024-21887, Ivanti, ivanti acquisition, Ivanti Zero day vulnerability, SB Blogwatch, Zero Day Attacks, zero-day, zero-day attack, Zero-Day Bug, Zero-day Exploit, zero-day exploits, zero-day flaw, zero-day flaws, zero-day threat, Zero-day threats, zeroday, zerodayvulnerabilities
Under active exploitation since last year—but still no patch available ...
Security Boulevard
The State of Open Source Cloud-Native Security
Bill Doerrfeld | | Cloud Security, Cloud-Native Security, open source, OpenSSF, SBOMs, Software Security
As 2024 kicks off, here's where cloud-native supply chain security stands and what to expect in the immediate future ...
Security Boulevard