5 AI threats keeping SOC teams up at night

5 AI threats keeping SOC teams up at night

The explosion in the use of OpenAI's ChatGPT and other large language models (LLMs) — along with a range of other artificial intelligence (AI) and machine learning (ML) systems — is ramping ...
The Week in Security: Barracuda email flaw left open for months, calls for AI governance turn existential

The Week in Security: Barracuda email flaw left open for months, calls for AI governance turn existential

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security This week: Barracuda’s ...
The Week in Security: Lazarus targets Microsoft servers in espionage campaign, the future of PyPI

The Week in Security: Lazarus targets Microsoft servers in espionage campaign, the future of PyPI

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: Application security, cybersecurity, ...
The Week in Security: Coalition takes down Russia's Snake espionage tool, GitHub plugs API leaks

The Week in Security: Coalition takes down Russia’s Snake espionage tool, GitHub plugs API leaks

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, ...
SIEM Content, False Positives and Engineering (Or Not) Security

SIEM Content, False Positives and Engineering (Or Not) Security

As we learned, SIEM still matters in 2023.Debating SIEM in 2023, Part 1Debating SIEM in 2023, Part 2But since one winter day in 2002, when I wrote my first correlation rule for a ...
How to operationalize SBOMs for incident response

How to operationalize SBOMs for incident response

As the cybersecurity industry has endeavored to reduce the risk of software supply chain security flaws, software bills of materials (SBOMs) have received a ton of attention of late, as security pundits ...
RSAC in review: Supply chain security, cyber war and AI

RSAC in review: Supply chain security, cyber war and AI

More than three years after the COVID pandemic threw the global economy — not to mention the technology conference business — on its ear, the RSA Security Conference was back in full ...
The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries

The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, ...
Secrets Exposed: The why, the how – and what to do about – secrets security in software

Secrets Exposed: The why, the how – and what to do about – secrets security in software

For software development teams to maintain and properly set up development environments and pipelines, they need to use software secrets such as environment variables, tokens and keys in these processes ...