generative AI security, Microsoft AI cybersecurity

Embrace Generative AI for Security, But Use Caution

Generative AI will be a net positive for security, but with a large caveat: It could make security teams dangerously complacent ...
Security Boulevard

Outsmarting Phishers: Answering Your Webinar Questions 

| | Blog, email security
In our recent webinar, “Outsmarting Phishers: Maximize Your ... The post Outsmarting Phishers: Answering Your Webinar Questions  appeared first on EasyDMARC ...
GUEST ESSAY: NIST’s Cybersecurity Framework update extends best practices to supply chain, AI

GUEST ESSAY: NIST’s Cybersecurity Framework update extends best practices to supply chain, AI

The National Institute of Standards and Technology (NIST) has updated their widely used Cybersecurity Framework (CSF) — a free respected landmark guidance document for reducing cybersecurity risk. Related: More background on CSF ...
A green worm on a juicy red apple

Apple M-Series FAIL: GoFetch Flaw Finds Crypto Keys

GoFAIL: Researchers worm their way into broken cache-filling microcode in most Macs and iPads ...
Security Boulevard
AppSec, AI, API app Google application security AppSec

Application Security for Dummies: The Only Way Forward

To improve application security, we must make security so stupid that anyone can do it, and that applies up and down the stack ...
Security Boulevard
CISA China Volt Typhoon

CISA, NSA, Others Outline Security Steps Against Volt Typhoon

Top cybersecurity agencies in the United States and other countries are again warning critical infrastructure companies about the “urgent risk” posed by Chinese state-sponsored threat group Volt Typhoon and are recommending steps ...
Security Boulevard
AI code fixing

Sentry, GitHub Use AI to Help Fix Coding Errors

Developers are getting more help detecting and addressing bugs in their code through new AI-based tools that Sentry.io and GitHub each introduced this week. Sentry unveiled the beta of Autofix, a feature ...
Security Boulevard
Phishing triage workflow in Smart SOAR

How to Build a Phishing Playbook Part 3: Playbook Development

Welcome the third part of our series on how to build an automated incident response playbook for phishing threats inside of Smart SOAR. In this part, we will be transferring our rough ...

Secure Guardrails