Tag: Software Security Archives – Software Curated

Apple updates its Platform Security Guide

It’s essential reading for IT admins, security researchers and anyone with an interest in Apple security, now updated for 2024. Apple’s head of security engineering and architecture, Ivan Krstić, this week announced the publication of what should be essential reading…

Microsoft Will Hold Executives Accountable for Cybersecurity

Microsoft will make organizational changes and hold senior leadership directly accountable for cybersecurity as part of an expanded initiative to bolster security across its products and services. Microsoft’s executive vice president of security, Charlie Bell, announced the plans in a…

Cisco Launches A New AI-Focused Security Solution

According to a corporate news release, the software, named HyperShield, employs artificial intelligence (AI) to safeguard apps, devices, and data across public and private data centres, clouds, and physical locations. HyperShield is the company’s second acquisition after purchasing cybersecurity startup…

Microsoft AI-Driven Security Tool Copilot for Security is Now GA

Microsoft recently announced the general availability of Copilot for Security, a generative Artificial Intelligence (AI) security product designed to help security and IT teams with the capabilities to protect their digital assets. Copilot for Security’s general availability introduces several new…

Microsoft unveils safety and security tools for generative AI

Microsoft is adding safety and security tools to Azure AI Studio, the company’s cloud-based toolkit for building generative AI applications. The new tools include protection against prompt injection attacks, detection of hallucinations in model output, system messages to steer models…

Google Cloud Launches Security Command Center Enterprise

Google Cloud has launched Security Command Center (SSC) Enterprise, a cloud risk management solution that offers proactive cloud security with enterprise security operations. The solution helps customers manage and mitigate risk across multi-cloud environments and is enhanced by Mandiant expertise.…

Best Practices for AI Training Data Protection

With the rise of AI, data protection challenges are evolving in parallel with the emerging technologies to both threaten and protect an enterprise’s data assets. When training AI, the massive quantities of data utilized for AI models pose new and…

5 tips for securing your remote workspace

Read our top tips on how employees can play a key role securing the enterprise when working remotely. Hybrid and remote working have become a permanent feature for the majority of businesses, as shown by multiple studies. However, for IT…

Antivirus Software: A Comprehensive Guide

There are several parallels between real viruses and computer viruses. Antivirus software, which offers comprehensive protection throughout the year, is essential for keeping your data and PCs safe from viruses and other dangers. Antivirus software may check for and eliminate…

Meta releases open-source tools for AI safety

Meta has introduced Purple Llama, a project dedicated to creating open-source tools for developers to evaluate and boost the trustworthiness and safety of generative AI models before they are used publicly. Meta emphasized the need for collaborative efforts in ensuring…

6 security best practices for cloud-native applications

The emergence of cloud-native architectures has dramatically changed the ways applications are developed, deployed, and managed. While cloud-native architectures offer significant benefits in terms of scalability, elasticity, and flexibility, they also introduce unique security challenges. These challenges often diverge from…

Chrome Supports Key Pinning on Android to Improve Security

Key pinning, a technique used to prevent an attacker from tricking a vulnerable certificate authority (CA) into issuing an apparently valid certificate for a server, is now used in Chrome for Android, version 106. This helps preventing man-in-the-middle attacks against…

What’s the state of Zero Trust security?

Zero Trust adoption is accelerating, with over half of organizations reporting they have adopted Zero Trust Security, according to research independently conducted by leading security research firm Ponemon Institute, sponsored by Hewlett Packard Enterprise. In the report, The 2023 Global…

Need To Know Data Redaction Software

In today’s Finance world, the protection of sensitive information has become paramount. With data breaches and privacy concerns on the rise, individuals and organizations alike are seeking effective solutions to safeguard their confidential data. One such solution is data redaction…

A Security Culture: Top Priorities for CISOs and their Teams

Cybercrime is increasing in efficiency, efficacy, and scale. Although organizations are frantically trying to prevent attacks from reaching their environments, there’s also an understanding that breaches are inevitable. According to IBM’s 2022 Cost of a Data Breach report, 83% of…

API security: key to interoperability or key to an organization?

Most applications built today leverage Application Programming Interfaces (APIs), code that makes it possible for digital devices, applications, and servers to communicate and share data. This code, or collection of communication protocols and subroutines, simplifies that communication, or data sharing.…

Cloud-based IT operations are on the rise

The people who maintain traditional data center systems have always objected to having IT assets managed by systems outside their firewalls. Years ago, when I predicted that this would happen, people would often laugh and not believe me. The signs…

Microsoft adopts Rust to boost Windows security and performance

Although Rust is still a relatively recent programming language, Microsoft has already embraced the technology as one of the most promising upgrades for Windows core programming. Redmond’s software engineers have been diligently rewriting crucial parts of the operating system in…

Spotify’s new Niche Mixes are tailor-made for me

One of the many reasons that Spotify has always been my music streaming app of choice is the strength of its personalized recommendations. I’m always on the hunt for new music, and having spent years contributing to the algorithm, Spotify…

It’s time to prioritize SaaS security

We’ve made a point of shoring up security for infrastructure-as-a-service clouds since they are so complex and have so many moving parts. Unfortunately, the many software-as-a-service systems in use for more than 20 years now have fallen down the cloud…

Here come the new Red Hat Enterprise Linux distros

Red Hat is the Linux distro security leader. And with its latest Red Hat Enterprise Linux (RHEL) beta releases, RHEL 8.7 and 9.1, the Linux powerhouse company is continuing to stake out its security claims. Red Hat is releasing both…