New guidance for organizations seeking to protect the generative AI tools they're running has been released by the OWASP Top ...
It’s been a little over a year since we first introduced security levels into Spectra Assure™ with the goal of reducing the ...
National insurance firm Crum and Forster is offering a professional liability program for CISOs who are facing growing ...
Augmented reality use cases have become prevalent in our society. The technology, which first emerged primarily in the world ...
Discover the 5 best vendor risk management solutions, designed to help you mitigate third-party risks while ensuring ...
The folks over at Packt Publishing sent me a gift recently. It was a copy of one of their latest books, Pentesting APIs: A practical guide to discovering, fingerprinting, and exploiting APIs. Oh, how ...
As software supply chain risks rise, regulatory authorities are increasingly requiring organizations to adopt software bills ...
I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to ...
Sweet Security offers detection and response for cloud native environments. Its approach is unique in how it unifies detection across cloud infrastructure, network, workloads, and applications, ...
Flare recently hosted our first Threat Intel Workshop with Senior Threat Intelligence Researcher Tammy Harper. Below are some of the questions Tammy covered in improving threat intelligence collection ...
Deployment of 5G and AI-enhanced IoT systems is accelerating. This, in turn, is driving up the number of IoT-connected ...
Organizations today face a surge of vulnerabilities and exposures. With data on assets and exposures scattered across platforms, complexity hinders timely action. Security teams are left to manually ...