Security Analytics

Analytics and Intelligence

organization, zero-trust, trust supply chain third-party

Navigating the NSA’s New Zero-Trust Guidelines

New guidelines from the NSA provide public sector and private organizations with the necessary framework to approach zero-trust ...
Security Boulevard
AI, cyber GRC, Microsoft AI cybersecurity

Microsoft Preps AI-Based Copilot for Security for April 1 Release

Microsoft for more than a year has been infusing generative AI capabilities throughout much of its product and services portfolio – such as Microsoft 365 and Bing – through its Copilot initiative, ...
Security Boulevard
brand impersonation, brand fraud, SlashNext edge Using AI and ML to Win Against Fraud

Strengthening Trust in Your Brand With Better Communication and Monitoring

Brand impersonation and suboptimal experiences can diminish or eliminate your customers’ trust, especially if they lose money to fraud ...
Security Boulevard
ChatGPT Gemini generative AI

Researchers Find Flaws in OpenAI ChatGPT, Google Gemini

The number of generative AI chatbots and their adoption by enterprises have exploded in the year-plus since OpenAI rolled out ChatGPT, but so have concerns by cybersecurity pros who worry not only ...
Security Boulevard
copilot

Best Practices for Securing Microsoft Copilot

Microsoft's Copilot is becoming a focal point for businesses seeking to revolutionize their operations and elevate productivity. Here's how to secure it ...
Security Boulevard
vulnerability zero day

JetBrains Says Rapid7’s Fast Release of Flaw Details Harmed Users

JetBrains is continuing to criticize Rapid7’s policy for disclosing vulnerabilities its researchers uncover, saying the cybersecurity firm’s quick release of details of flaws in JetBrains’ TeamCity platform harmed some customers and runs ...
Security Boulevard
phishing apps cloud appsec mobile app open source apps application security layer

Phishing Threats Rise as Malicious Actors Target Messaging Platforms

As messaging apps like Telegram gain popularity, cybercriminals are increasingly finding they are an attractive vector for phishing attacks ...
Security Boulevard
Broadcom Symantec Carbon Black

Broadcom Merging Carbon Black, Symantec to Create Security Unit

Carbon Black’s uncertain future following the closing of Broadcom’s $69 billion acquisition of VMware in November is now settled, with the security software business merging with Symantec to form Broadcom’s new Enterprise ...
Security Boulevard
Unveiling The Applications and Distinctions of Machine Learning and Artificial Intelligence in Cybersecurity

Unveiling The Applications and Distinctions of Machine Learning and Artificial Intelligence in Cybersecurity

The terms "machine learning" and "artificial intelligence" are frequently used in cybersecurity, often interchangeably, leading to confusion about their precise meanings and applications. Both machine learning and artificial intelligence play pivotal roles ...
IONIX software supply chain, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity

Mitigating Lurking Threats in the Software Supply Chain

The first step to addressing software supply chain vulnerabilities and threats is to understand the most common attacks. Here's where to start ...
Security Boulevard