AI regulation is coming, and quickly, Those laws will often require AI audits, so companies need to get ready. This article has been indexed from Security News | VentureBeat Read the original article: OpenAI says ChatGPT must be regulated. Meanwhile,…
Tag: Security News | VentureBeat
Top 5 cyber-threats and how to prevent them
Using insights from ethical hackers, routine testing and automation will help you boost your cybersecurity to defend against cyberattacks. This article has been indexed from Security News | VentureBeat Read the original article: Top 5 cyber-threats and how to prevent…
Businesses turn to new as-a-service models in Industry 4.0
From fintech to cybersecurity to electric vehicles, as-a-service models are gaining traction with businesses and consumers alike. This article has been indexed from Security News | VentureBeat Read the original article: Businesses turn to new as-a-service models in Industry 4.0
Cybersecurity organizations fight back against rise of emotet and omnatuor malvertising
Emotet, omnatuor and other malware and trojan hacking schemes continue to evolve and thrive. How organizations can fight back. This article has been indexed from Security News | VentureBeat Read the original article: Cybersecurity organizations fight back against rise of…
How APIs are shaping zero trust, and vice versa
APIs are a key attack vector. By applying zero trust across the API ecosystem, enterprises stand a better chance of avoiding breaches. This article has been indexed from Security News | VentureBeat Read the original article: How APIs are shaping…
How endpoint management can transform retail
Learn the many benefits of unified endpoint management for retail, and not just in the brick-and-mortar world; q-commerce too. This article has been indexed from Security News | VentureBeat Read the original article: How endpoint management can transform retail
A call for data-first security
Massive data breaches and data leaks occur all too often. It’s time for a new evolution of cybersecurity: data-first security. Here’s why: This article has been indexed from Security News | VentureBeat Read the original article: A call for data-first…
The black hat hacker trap: Why unethical hacking lures young people
Organizations and pen testers alike must put themselves in front of tech-savvy younger generations to encourage ethical hacking. This article has been indexed from Security News | VentureBeat Read the original article: The black hat hacker trap: Why unethical hacking…
Red Hat gives an ARM up to OpenShift Kubernetes operations
Red Hat announced the general availability of OpenShift 4.12, bringing new capabilities to its hybrid cloud application delivery platform. This article has been indexed from Security News | VentureBeat Read the original article: Red Hat gives an ARM up to…
Gem Security shows detection and response key to cloud security, raises $11M
Gem Security emerges from stealth with $11 million in seed funding for cloud security detection and response solution. This article has been indexed from Security News | VentureBeat Read the original article: Gem Security shows detection and response key to…
Why confidential computing will be critical to (not so distant) future data security efforts
Confidential computing protects data in use by employing advanced encryption methods. What CISOs need to know about the emerging technology. This article has been indexed from Security News | VentureBeat Read the original article: Why confidential computing will be critical…
Nvidia CSO: Generative AI, ChatGPT has made security a ‘cat and mouse’ game
Nvidia CSO David Reber argues that generative AI solutions like ChatGPT have turned cybersecurity into a ‘cat and mouse’ game. This article has been indexed from Security News | VentureBeat Read the original article: Nvidia CSO: Generative AI, ChatGPT has…
Saviynt raises $205M and affirms that IAM must be cloud-friendly
Saviynt raises $205 million in funding for its cloud IAM solution, highlighting that identity management must be cloud-friendly. This article has been indexed from Security News | VentureBeat Read the original article: Saviynt raises $205M and affirms that IAM must…
Sentra raises $30M to streamline data securely across the public cloud
DSPM provider Sentra raises $30 million as part of a series A funding round, for a solution to protect data in the public cloud. This article has been indexed from Security News | VentureBeat Read the original article: Sentra raises…
How endpoint management can transform retail
Learn the many benefits of unified endpoint management for retail, and not just in the brick-and-mortar world; q-commerce too. This article has been indexed from Security News | VentureBeat Read the original article: How endpoint management can transform retail
Cybersecurity organizations fight back against rise of emotet and omnatuor malvertising
Emotet, omnatuor and other malware and trojan hacking schemes continue to evolve and thrive. How organizations can fight back. This article has been indexed from Security News | VentureBeat Read the original article: Cybersecurity organizations fight back against rise of…
How APIs are shaping zero trust, and vice versa
APIs are a key attack vector. By applying zero trust across the API ecosystem, enterprises stand a better chance of avoiding breaches. This article has been indexed from Security News | VentureBeat Read the original article: How APIs are shaping…
Cybersecurity sees rise of emotet and the omnatuor malvertising
Emotet, omnatuor and other malware and trojan hacking schemes continue to evolve and thrive. How organizations can fight back. This article has been indexed from Security News | VentureBeat Read the original article: Cybersecurity sees rise of emotet and the…
Red Hat gives an ARM up to OpenShift Kubernetes operations
Red Hat announced the general availability of OpenShift 4.12, bringing new capabilities to its hybrid cloud application delivery platform. This article has been indexed from Security News | VentureBeat Read the original article: Red Hat gives an ARM up to…
Gem Security shows detection and response key to cloud security, raises $11M
Gem Security emerges from stealth with $11 million in seed funding for cloud security detection and response solution. This article has been indexed from Security News | VentureBeat Read the original article: Gem Security shows detection and response key to…
Why confidential computing will be critical to (not so distant) future data security efforts
Confidential computing protects data in use by employing advanced encryption methods. What CISOs need to know about the emerging technology. This article has been indexed from Security News | VentureBeat Read the original article: Why confidential computing will be critical…
USPS signs data management contract worth up to $70M with Veritas Technologies
The United States Postal Service (USPS) and Veritas Technologies announce a new data management contract worth up to $70 million. This article has been indexed from Security News | VentureBeat Read the original article: USPS signs data management contract worth…
Saviynt raises $205M and affirms that IAM must be cloud-friendly
Saviynt raises $205 million in funding for its cloud IAM solution, highlighting that identity management must be cloud-friendly. This article has been indexed from Security News | VentureBeat Read the original article: Saviynt raises $205M and affirms that IAM must…
Sentra raises $30M to streamline data securely across the public cloud
DSPM provider Sentra raises $30 million as part of a series A funding round, for a solution to protect data in the public cloud. This article has been indexed from Security News | VentureBeat Read the original article: Sentra raises…
Why enterprises trust hardware-based security over quantum computing
Quantum computing is being realized, but its limitations in cybersecurity are prompting organizations to adopt hardware-based security. This article has been indexed from Security News | VentureBeat Read the original article: Why enterprises trust hardware-based security over quantum computing
As public cloud use increases, security gaps widen
The public cloud has many advantages: Low cost, reliability, flexibility, simplicity, scalability. But it has many security gaps, too. This article has been indexed from Security News | VentureBeat Read the original article: As public cloud use increases, security gaps…
Black swans events are shaping the cybersecurity present and future
Black swan events are pushing the cybersecurity industry to strengthen defensive products and provide a comprehensive solution. This article has been indexed from Security News | VentureBeat Read the original article: Black swans events are shaping the cybersecurity present and…
Why we should care about the theft of $1
User journey analytics can bolster cybersecurity efforts by establishing baseline activities and flagging anomalies. This article has been indexed from Security News | VentureBeat Read the original article: Why we should care about the theft of $1
Top 5 stories of the week: Ransomware takes a hit, Intel struggles, CIOs get their own special issue, and more
January is nearly over — time is flying by! And things aren’t slowing down in the tech world, either. Here’s the top 5 stories this week. This article has been indexed from Security News | VentureBeat Read the original article: Top 5…
Leaders anticipate cyber-catastrophe in 2023, report World Economic Forum, Accenture
The World Economic Forum (WEF) and Accenture’s Global Security Outlook for 2023 anticipates a catastrophic cyberevent. This article has been indexed from Security News | VentureBeat Read the original article: Leaders anticipate cyber-catastrophe in 2023, report World Economic Forum, Accenture
Gartner report shows zero trust isn’t a silver bullet
Research released by Gartner suggests that zero-trust controls are ineffective at addressing API-based threats and social engineering scams. This article has been indexed from Security News | VentureBeat Read the original article: Gartner report shows zero trust isn’t a silver…
10 steps every business can take to avoid a cybersecurity breach
10 ways to beef up your cybersecurity and prevent the potentially ruinous damage to your business of a data breach. This article has been indexed from Security News | VentureBeat Read the original article: 10 steps every business can take…
One-third of orgs don’t take cyberwarfare seriously despite the Russia-Ukraine war
Research released by Armis finds that one-third of organizations don’t take cyberwarfare seriously, despite the ongoing Russia-Ukraine war. This article has been indexed from Security News | VentureBeat Read the original article: One-third of orgs don’t take cyberwarfare seriously despite…
What the FBI’s Hive takedown means for the ransomware economy
The FBI’s coordinated operation against the Hive ransomware gang highlights that the ransomware economy is under serious strain in 2023. This article has been indexed from Security News | VentureBeat Read the original article: What the FBI’s Hive takedown means…
The CIO agenda in 2023: Driving growth and transformation
CIOs in 2023 will be called upon to drive growth and transformation, not just keep the data center humming and enterprise software running. This article has been indexed from Security News | VentureBeat Read the original article: The CIO agenda…
How CIOs can drive identity-based security awareness
In encouraging adoption of identity-based security tools, concentrate on how they serve employees by protecting their identities. This article has been indexed from Security News | VentureBeat Read the original article: How CIOs can drive identity-based security awareness
Making security invisible with adaptive access management
Why security tools that are invisible, seamless and adaptive can foster user adoption and accelerate response. This article has been indexed from Security News | VentureBeat Read the original article: Making security invisible with adaptive access management
Federated learning key to securing AI
Federated learning can elevate AI. By securing model training, it unlocks a myriad of use cases that can change the world as we know it. This article has been indexed from Security News | VentureBeat Read the original article: Federated…
Strata raises $26M to unify IAM across the cloud
Identity orchestration provider Strata announces it has raised $26 million in Series B funding for a multi-vendor cloud IAM solution. This article has been indexed from Security News | VentureBeat Read the original article: Strata raises $26M to unify IAM…
How password management tools are helping enterprises prevent intrusions
Implementing a trustworthy password management tool is key to securing your organization. Here are some top choices to boost cybersecurity. This article has been indexed from Security News | VentureBeat Read the original article: How password management tools are helping…
Snyk and ServiceNow’s strategic partnership shows DevSecOps isn’t a fad
Snyk announces a $25 million strategic investment from ServiceNow and the release of a new DevSecOps integration. This article has been indexed from Security News | VentureBeat Read the original article: Snyk and ServiceNow’s strategic partnership shows DevSecOps isn’t a…
One-third of orgs don’t take cyberwarfare seriously despite the Russia-Ukraine war
Research released by Armis finds that one-third of organizations don’t take cyberwarfare seriously, despite the ongoing Russia-Ukraine war. This article has been indexed from Security News | VentureBeat Read the original article: One-third of orgs don’t take cyberwarfare seriously despite…
Defending against a growing botnet and DDoS epidemic in 2023
Botnet and DDoS attacks will continue to proliferate in 2023. Experts weigh in on how cybersecurity teams can prepare for and combat them. This article has been indexed from Security News | VentureBeat Read the original article: Defending against a…
T-Mobile data breach shows API security can’t be ignored
T-Mobile reports an API data breach affecting 37 million customer accounts as part of a widespread trend of API exploitation. This article has been indexed from Security News | VentureBeat Read the original article: T-Mobile data breach shows API security…
How AI and data enrichment can protect the vulnerable during a recession
Fraudsters work hard to make their methods convincing. Technology and intelligent use of data can help catch cyber criminals and their scams. This article has been indexed from Security News | VentureBeat Read the original article: How AI and data…
Orca Security deploys ChatGPT to secure the cloud with AI
Orca Security announces the launch of a new integration with ChatGPT designed to secure the cloud with AI-driven remediation. This article has been indexed from Security News | VentureBeat Read the original article: Orca Security deploys ChatGPT to secure the…
50% of orgs report experiencing data breaches due to exposed API secrets
Research from Corsha Inc. finds that in 2022, 50% of organizations experienced data breaches due to exposed API secrets. This article has been indexed from Security News | VentureBeat Read the original article: 50% of orgs report experiencing data breaches…
Cloud IAM recovery firm raises $5M to tighten identity access management
AccSense, a continuous access and continuity platform for Okta, ssays cloud identity access management (IAM) needs better data resilience. This article has been indexed from Security News | VentureBeat Read the original article: Cloud IAM recovery firm raises $5M to…
Denial of service vulnerability discovered in libraries used by GitHub and others
Denial of service attacks are rising. Case in point: Legit Security discovered a DoS vulnerability in libraries used by GitHub and others. This article has been indexed from Security News | VentureBeat Read the original article: Denial of service vulnerability…
IBM: Quantum computing poses an ‘existential threat’ to data encryption
IBM warns quantum computing poses an ‘existential threat’ to data encryption and says enterprises need to adopt quantum-safe capabilities. This article has been indexed from Security News | VentureBeat Read the original article: IBM: Quantum computing poses an ‘existential threat’…
What’s holding Web3 back from prime time
Why security is critical, and decentralized, user-driven services that won’t go dark when you need them most are the promise of Web3. This article has been indexed from Security News | VentureBeat Read the original article: What’s holding Web3 back…
Top 5 stories of the week: ChatGPT, CES and cybersecurity advice from AWS
A roundup of the top 5 stories this week, including AI at CES and coming soon to Microsoft Office, and security advice from AWS. This article has been indexed from Security News | VentureBeat Read the original article: Top 5…
Why the US government’s TikTok ban is impractical for the private sector
While the U.S. government looks to ban TikTok, private enterprises are likely to struggle to restrict the app due to BYOD policies. This article has been indexed from Security News | VentureBeat Read the original article: Why the US government’s…
3 factors that can ensure zero trust success
Accounting for these three factors can make the difference between failure and success for a zero trust rollout. This article has been indexed from Security News | VentureBeat Read the original article: 3 factors that can ensure zero trust success
AWS security heads offer top cybersecurity predictions for 2023
Increased use of IaC, more automated reasoning, action around quantum-resistant cryptography: AWS heads predict 2023 cybersecurity trends. This article has been indexed from Security News | VentureBeat Read the original article: AWS security heads offer top cybersecurity predictions for 2023
Nvidia adds AI workflows to retail to help combat shrinkage
Nvidia is helping retailers reduce theft and fraud, as well as optimize in-store experience, with new retail AI workflows announced today. This article has been indexed from Security News | VentureBeat Read the original article: Nvidia adds AI workflows to…
How upskilling and training providers help close the cybersecurity skills gap
Hack the Box raises $55 million in funding, highlighting that cybersecurity training and upskilling holds the key to filling the skills gap. This article has been indexed from Security News | VentureBeat Read the original article: How upskilling and training…
Glassdoor’s best cybersecurity companies for job hunters in 2023
Despite a recession and budget and staff cuts across industries, cybersecurity talent remains in high demand. This article has been indexed from Security News | VentureBeat Read the original article: Glassdoor’s best cybersecurity companies for job hunters in 2023
Intel launches confidential computing solution for virtual machines
Intel announces the launch of a new confidential computing, VM-isolation solution called Intel Trust Domain Extension (TDX). This article has been indexed from Security News | VentureBeat Read the original article: Intel launches confidential computing solution for virtual machines
5 ways endpoints are turbocharging cybersecurity innovation
From unified endpoint management to remote browser isolation, here’s how new defenses against endpoint attacks are advancing cybersecurity. This article has been indexed from Security News | VentureBeat Read the original article: 5 ways endpoints are turbocharging cybersecurity innovation
Ransomware attacks dropped 61% last year, but orgs can’t be complacent
Research released by Delinea and Censuswide found that ransomware attacks dropped by 61% last year, with only 25% of organizations breached. This article has been indexed from Security News | VentureBeat Read the original article: Ransomware attacks dropped 61% last…
5 AI takeaways from CES for enterprise business
We asked for feedback from vendor experts about the most important AI and ML takeaways for the enterprise coming out of CES 2023. This article has been indexed from Security News | VentureBeat Read the original article: 5 AI takeaways…
One year later: Apple’s rules on data privacy force a rethink on customer engagement
Apple’s data privacy policy change showed just how lazy some marketers had gotten. They must find new and creative ways to accomplish goals. This article has been indexed from Security News | VentureBeat Read the original article: One year later:…
Why IAM’s identity-first security is core to zero trust
Why identity access management (IAM) is core to zero-trust frameworks designed to protect hybrid, virtual workforces against threats. This article has been indexed from Security News | VentureBeat Read the original article: Why IAM’s identity-first security is core to zero…
Why cloud observability will be critical in 2023
Despite cloud’s ability to enhance business resiliency, most companies have a gap in their cloud infrastructure regarding observability. This article has been indexed from Security News | VentureBeat Read the original article: Why cloud observability will be critical in 2023
Twitter data breach shows APIs are a goldmine for PII and social engineering
The 2022 Twitter data breach and leak of over 200 million emails shows that APIs are a goldmine for social engineering scams and PII. This article has been indexed from Security News | VentureBeat Read the original article: Twitter data…
Outsourcing’s dark side: How to stop the surge of supply chain attacks
Smart, proactive organizations can prevent software supply chain attacks and create secure relationships with trusted third-party suppliers. This article has been indexed from Security News | VentureBeat Read the original article: Outsourcing’s dark side: How to stop the surge of…
Web3 ecosystem lost $3.9 billion to crypto fraud in 2022
An Immunefi report finds that $3.1 billion in crypto was lost across the Web3 ecosystem in 2022 due to hacks and scams. This article has been indexed from Security News | VentureBeat Read the original article: Web3 ecosystem lost $3.9…
Why enterprises can’t afford to overlook API security in 2023
With API cybersecurity incidents on the rise, enterprises need a more proactive approach to protecting apps from threat actors. This article has been indexed from Security News | VentureBeat Read the original article: Why enterprises can’t afford to overlook API…
Web3 ecosystem lost $3.1 billion to crypto fraud in 2022
An Immunefi report finds that $3.1 billion in crypto was lost across the Web3 ecosystem in 2022 due to hacks and scams. This article has been indexed from Security News | VentureBeat Read the original article: Web3 ecosystem lost $3.1…
AI threat detection that ‘understands you’ critical to thwarting attacks
AI threat detection is a critical tool that can help organizations protect themselves against increasingly complex cyber attacks. This article has been indexed from Security News | VentureBeat Read the original article: AI threat detection that ‘understands you’ critical to…
How hybrid cybersecurity is strengthened by AI, machine learning and human intelligence
Human intelligence combined with AI and ML models enable hybrid cybersecurity to better predict, identify and stop security breaches. This article has been indexed from Security News | VentureBeat Read the original article: How hybrid cybersecurity is strengthened by AI,…
Defensive vs. offensive AI: Why security teams are losing the AI war
What enterprises can do to counter weaponized AI and ML wielded by cybercriminal gangs and nation-state threat actors. This article has been indexed from Security News | VentureBeat Read the original article: Defensive vs. offensive AI: Why security teams are…
5 reasons why data privacy compliance must take center stage in 2023
Companies that are proactive in their data privacy and security compliance approaches will find themselves in an enviable position in 2023. This article has been indexed from Security News | VentureBeat Read the original article: 5 reasons why data privacy…
My 13 favorite AI stories of 2022 | The AI Beat
As I rev up for all things AI in 2023, I wanted to take a quick look back at my favorite stories, large and small, that I covered in 2022. This article has been indexed from Security News | VentureBeat…
What’s in store for cybersecurity in 2023
2023 is certain to be as action-packed a year in cybersecurity as 2022 was. Rubrik exec shares five predictions for the coming year. This article has been indexed from Security News | VentureBeat Read the original article: What’s in store…
Father and son help cryptocurrency owners recover their lost assets
Lost your Bitcoin account password? Your efforts to recover your funds might lead you to a father-and-son team dubbed Crypto Asset Recovery. This article has been indexed from Security News | VentureBeat Read the original article: Father and son help…
5 ways CISOs can secure BYOD and remote work without increasing security budgets
CISOs must implement lean and effective security controls to tread through 2023 and make it out on the other side. This article has been indexed from Security News | VentureBeat Read the original article: 5 ways CISOs can secure BYOD…
Government inaction adds pressure to IoMT device and data security
Healthcare cybersecurity teams must optimize security practices and prioritize the true threats among the myriad IoMT device vulnerabilities. This article has been indexed from Security News | VentureBeat Read the original article: Government inaction adds pressure to IoMT device and…