In this episode of "Cybersecurity Insights," Antoinette Hodes of Check Point Research discusses the need to consolidate an organization's cybersecurity posture, gain visibility into OT and IT assets, and use cybersecurity education to increase worker safety.
Cisco took its first major step toward realizing its secure cloud vision in April with the debut of a new extended detection and response platform. The next set of enhancements around generative AI, secure access and defending applications across multiple clouds debuted Tuesday at Cisco Live 2023.
UEBA solutions ingest operational data from many sources and use analytics such as machine learning (ML) and behavior analysis to determine what is normal behavior by human users and non-human entities operating in an enterprise network. Over time, the solution builds standard profiles of behavior for these users and...
Despite the beating new publicly traded security companies have taken during the economic downturn, Rubrik is looking to test its luck in the public market. Reuters reported Monday the firm is working with Goldman Sachs, Barclays and Citigroup in preparation for an IPO that could take place in 2024.
Cloud-native SIEM dramatically simplifies deployment and management, and increases ease of use, speed, and detection accuracy. Cloud-native SIEM is also highly scalable, efficient, and cost effective. As organizations grow, merge, and evolve, cloud-native security solutions can offload the costs of hardware and...
Unlike other types of security threats, insider threats are complicated because only a few are caused intentionally, and they typically involve valid credential use. Beyond full- and part-time employees, insiders include contractors, vendors, customers, interns, and others who can be working on site or remote....
In the era of digital transformation, banks’ security leaders are grappling with the challenges of maintaining a secure digital ecosystem while keeping costs down. With the explosion of touchpoints and data brought on by the digitization of money and services, the banking industry is now a prime target for...
In the days between May 26 and June 1, Tornado Cash validators regained control, Tron patched a bug that could be exploited for $500 million, Binance said it will delist privacy coins in four European countries, Coinbase settled insider trading charges and Hong Kong police joined the metaverse.
In this episode of "Cybersecurity Insights," Rodrigo Liang of SambaNova Systems discusses what he calls "the fastest industrial revolution we've seen." The topic, of course, is generative artificial intelligence, and Liang considers whether businesses should embrace it or hold back.
Artificial intelligence poses a global risk of extinction tantamount to nuclear war and pandemics, say a who's who of artificial intelligence executives in an open letter that evokes danger without suggesting how to mitigate it. Among the signatories are Sam Altman and Geoffrey Hinton.
Cisco plans to make its third tuck-in cybersecurity acquisition of 2023 to protect email, cloud office applications and enterprise communications through natural language understanding. Cisco will take advantage of Armorblox's predictive and generative AI to help customers bolster their security.
Cisco Security Executive Vice President and General Manager Jeetu Patel said the industry struggles to address multifaceted attacks that originate in email and include bad links, malware downloads to a device and more. Cyber defenders need correlated data from multiple sources of telemetry, he said.
Change management is a critical part of a robust API management program, said Shaam Farooq, vice president of technology at Atlas Energy Solutions and a CyberEdBoard member. Team members must review and approve changes as they happen and communicates those changes across IT and OT security teams.
In this episode of "Cybersecurity Insights," Chen Burshan and Amir Shachar of Skyhawk Security discuss how they integrated generative AI into their threat detection process and significantly increased the speed and lowered the costs of detecting breaches based by focusing on anomalous activity.
Strengthening cybersecurity is the # 1 priority for IT departments and infrastructure decision makers worldwide. A multi-layered 3-2-1-0 data protection strategy provides rapid recovery, protection against cyberthreats, data loss, and local disasters, and designing a proper approach can minimize your risk. Join Eric...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.