Generative AI in Security: Risks and Mitigation Strategies

Generative AI in Security: Risks and Mitigation Strategies

Generative AI became tech’s fiercest buzzword seemingly overnight with the release of ChatGPT. Two years later, Microsoft is using OpenAI foundation models and fielding questions from customers about how AI changes the security landscape. Siva Sundaramoorthy, senior cloud solutions security architect at Microsoft, often answers these questions. The security expert provided an overview of generative AI — including its benefits and security risks — to a crowd of cybersecurity professionals at ISC2 in Las Vegas…

Read More

What Is the ‘Most Pressing Concern’ for Cyber Professionals?

What Is the ‘Most Pressing Concern’ for Cyber Professionals?

Generative AI was top of mind at the ISC2 Security Congress conference in Las Vegas in October 2024. How much will generative AI change what attackers — and defenders — can do? Alex Stamos, CISO at SentinelOne and professor of computer science at Stanford University, sat down with TechRepublic to discuss today’s most pressing cybersecurity concerns and how AI can both help and thwart attackers. Plus, learn how to take full advantage of Cybersecurity Awareness…

Read More

Password Advice for the Rest of Us

Password Advice for the Rest of Us

October is Cybersecurity Awareness Month (CAM). All month long we’ll be presenting tips and tricks, as well as advice on a number of security topics, with the aim of helping inform and educate the public. We’ll start with some bad news some of you might not know, passwords are a problem and it’s hard to make a good one. This leaves many people vulnerable and exposed. So then, what is it exactly that makes a…

Read More

How much do you count on the internet every day? | McAfee Blog

How much do you count on the internet every day? | McAfee Blog

Maybe you do armloads of shopping on it. Maybe you skip going to the bank because you can tackle the bulk of your finances online. And perhaps you even pay your doctor a visit with it, instead of taking a trip to their office.   The way we use the internet has changed. We rely on it for a wealth of important things. Now more than ever, which makes Cybersecurity Awareness Month more important than ever.  …

Read More

7 Cyber Attack Vectors & How to Protect Them

7 Cyber Attack Vectors & How to Protect Them

7 Cyber Attack Vectors & How to Protect Them Risk Management The quicker a cyberattack is identified, the less it costs. Jon Clay, VP of Threat Intelligence, reviews 7 key initial attack vendors and provides proactive security tips to help you reduce cyber risk across the attack surface. By: Jon Clay November 15, 2022 Read time:  ( words) Digital transformation and remote work have rapidly expanded the attack surface. As the collection of applications, websites,…

Read More

Guide to Better Threat Detection and Response

Guide to Better Threat Detection and Response

Not all threats originate at the endpoint. According to Verizon’s 2022 Data Breach Investigations Report, web applications and email are the top two vectors for breaches. XDR enables you to detect compromised accounts sending internal phishing emails, whereas native email security tools typically only monitors for malicious emails being delivered externally. XDR will also sweep mailboxes for IoCs in real time. With this information, the SOC can investigate who else received the email as well…

Read More

Top Cloud Security Challenges & How to Beat Them

Top Cloud Security Challenges & How to Beat Them

An overview of how ngrok, a cloud tunnelling service, works. What’s at risk With access to a developer’s machine, cybercriminals can take advantage of local admin privileges or the shared work-in-progress to seed malware. They can also use hijacked credentials to get into the organization’s cloud dev environment or other systems, potentially accessing sensitive information or injecting vulnerabilities into application source code and pipelines. These kinds of breaches are hard to detect because the associated…

Read More

Ransomware Insurance Security Requirement Strategies

Ransomware Insurance Security Requirement Strategies

A cyber insurance policy is a necessary element in a company’s risk mitigation strategy. However, obtaining/renewing a policy is becoming more difficult, and premiums have drastically increased. Direct-written premiums increased by 92% in 2021 according to the National Association of Insurance Commissioners. The primary reason for the hardening of the cyber insurance market? Ransomware. Since ransomware accounts for 75% of all insurance claims, premiums are directly correlated with the 148% increase in attacks through Q3…

Read More

Software Patch Management Policy Best Practices for Large Orgs

Software Patch Management Policy Best Practices for Large Orgs

Organizations should start by only focusing on the bugs relevant to the application systems they use in-house. From that point, security teams can work to identify which of those bugs are being actively exploited and which are part of the business’s critical infrastructure. These are the key vulnerabilities to hone in on – the ones that could pose significant harm to your organization. The next is to identify those applications and/or operating systems that have…

Read More

Prevent Ransomware Attacks on Critical Infrastructure

Prevent Ransomware Attacks on Critical Infrastructure

Cybersecurity Awareness Month 2022 Series Cyberattacks against critical infrastructure can cause massive societal disruption and take an enormous financial toll. Those high stakes make industrial IT and OT (operational technologies) appealing targets for ransomware in particular. Applying strong cyber defenses to six critical OT domains can help prevent ransomware and other threats to power grids, pipelines and similar essential operations. Ransomware attacks on industrial targets continue to rise, accounting for more than half of all…

Read More
1 2