Latest Cybersecurity Articles

10 most critical LLM vulnerabilities

Dec 3, 2024

Prompt injection and supply chain vulnerabilities remain the main LLM vulnerabilities but as the technology evolves new risks come to light including system prompt leakage…

10 ways hackers will use machine learning to launch attacks

Nov 5, 2024

AI and machine learning are improving cybersecurity, helping human analysts triage threats and close vulnerabilities quicker. But they are also helping threat actors launch bigger,…

10 most critical LLM vulnerabilities

Oct 15, 2024

From prompt injections to model theft, OWASP has identified the most prevalent and impactful vulnerabilities found in AI applications based on large language models (LLMs).

Ransomware recovery: 8 steps to successfully restore from backup

Sep 2, 2024

The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here’s how to do it.

NIST finally settles on quantum-safe crypto standards

Aug 13, 2024

After years of review, the National Institute of Standards and Technology has chosen three encryption algorithms as the basis for its post-quantum security strategy.

Post-quantum encryption: Crypto flexibility will prepare firms for quantum threat, experts say

Aug 7, 2024

NIST standards for quantum-safe encryption are due out this summer. As quantum computing advances, enterprises need to consider their encryption infrastructure and post-quantum security strategies.

Microsoft Entra Suite is late to the SSE pool but will still make waves

Jul 24, 2024

Despite being late to market, Microsoft’s secure service edge (SSE) offering has some advantages, including cost and ties to Microsoft’s identity access management services.

AI agents can find and exploit known vulnerabilities, study shows

Jul 2, 2024

In a somewhat chilling revelation, AI agents were able to find and exploit known vulnerabilities, but only under certain conditions, which researchers say indicates they’re…

Breach and attack simulation tools: Top vendors, key features, how to choose

Jun 4, 2024

BAS products simulate attacks to test a company’s defenses against threat vectors. The following guide can help you make the right choice for your organization.

AI governance and cybersecurity certifications: Are they worth it?

May 6, 2024

Organizations have started to launch AI certifications in governance and cybersecurity but given how immature the space is and how fast it’s changing, are these…

The state of ransomware: Faster, smarter, and meaner

Mar 25, 2024

The ransomware business hit record highs in 2023 despite falling payment rates, as attackers scaled up the number of attacks and new AI weapons were…

Generative AI poised to make substantial impact on DevSecOps

Mar 11, 2024

Generative AI could be the holy grail of DevSecOps, from writing secure code and documentation to creating tests. But it could be a major point…

How GenAI helps entry-level SOC analysts improve their skills

Mar 5, 2024

By automating repetitive triage and documentation tasks, generative AI systems allow entry-level security analysts to spend more time on investigations, response, and developing core skills.

Assessing and quantifying AI risk: A challenge for enterprises

Jan 30, 2024

Risks associated with artificial intelligence have grown with the use of GenAI and companies must first understand their risk to create the best protection plan.

3 ways to fix old, unsafe code that lingers from open-source and legacy programs

Nov 29, 2023

Code vulnerability is not only a risk of open-source code, with many legacy systems still in use — whether out of necessity or lack of…

Data loss prevention vendors tackle gen AI data risks

Oct 31, 2023

Businesses are using DLP tools to help secure generative AI and reduce risks of ChatGPT and similar applications.

5 areas where zero trust can’t protect your organization

Sep 11, 2023

With growing adoption of zero trust, CISOs must look at all possible blind spots across the organization, be that unmonitored IoT devices or third-party systems,…

VMware Cloud gains faster ransomware recovery, expanded management capabilities

Aug 22, 2023

Among the announcements at the VMware Explore conference is a new IBM-managed service based on VMware Cloud editions.

VMware NSX+ centralizes cloud networking and security for multicloud environments

Aug 22, 2023

VMware NSX+ is a new cloud-managed service that enables consistent network operations and centralized security policy creation and enforcement in multicloud environments.

VMware combines SASE and edge management in new orchestration platform, announces private 5G service

Aug 22, 2023

News from the VMware Explore conference includes a unified management platform for VMware’s SASE and edge computing stack, along with a new managed private mobile…

3 strategies that can help stop ransomware before it becomes a crisis

Aug 16, 2023

For those hoping to avoid the pay-or-not-to-pay ransomware dilemma, there are three things to focus on that can help CISOs: create incident response plans, improve…

Hybrid mesh firewall platforms gain interest as management challenges intensify

Aug 15, 2023

Different types of firewalls, including hardware, virtual, cloud-native, and firewall as a service, can be deployed and managed from a central interface with a hybrid…

Why API attacks are increasing and how to avoid them

Jul 25, 2023

Growing use of APIs give attackers more ways to break authentication controls, exfiltrate data, or perform disruptive acts.

Gartner: SSE landscape shifts as vendors add more security services

Jul 12, 2023

Vendors are stacking their security service edge (SSE) suites with even more security functions, according to the latest Gartner Magic Quadrant.

How CISOs can balance the risks and benefits of AI

Jun 27, 2023

Rapid growth and development of AI is pushing the limits of cybersecurity and CISOs must take charge now to be ahead of a range of…

Cybersecurity in a Post-Quantum World

Jun 7, 2023

Experts agree that future quantum computers will break most current encryption when they become sufficiently powerful. The code to do this – Shor’s algorithm –…

5G network slices could be vulnerable to attack, researchers say

May 22, 2023

Configuration errors and device vulnerabilities could allow attackers to move laterally across 5G network slices.

Insured companies more likely to be ransomware victims, sometimes more than once

May 15, 2023

A recent report found that companies with cyber insurance have been hit by ransomware more than those without it, and sometimes more than once. Although…

Siemens focuses on zero trust, legacy hardware, supply chain challenges to ensure cybersecurity of internal systems

Apr 25, 2023

Siemens us chief cybersecurity officer Helen Negre discusses how the organization is focusing on zero trust to ensure the security of internal systems across its…

Secure Cloud Environments on a Budget: Focus on the Essentials

Apr 5, 2023

In an era of budget cuts and layoffs, data center managers need to get the most bang for their buck when securing cloud environments.