Here are three ways security teams can harness AI to strengthen their security operations by going beyond just detection and response.
Security teams are being slowly drowned by attacks that weaken our nation’s largest businesses and critical infrastructure with no chance to catch their breath.
Cybersecurity news for January includes warnings about attacks targeting elections, greater phishing sophistication from generative AI, and zero-day attacks on iOS.
Aside from Microsoft, there were a number of Adobe updates this month and one security update for Mozilla Thunderbird.
Law enforcement is making progress – and offering bounties – to stop ransomware gangs.
Is AI a solution to cybercrime or just another tool criminals will use against you and your customers?
With more than half of June to go, the CVEs and attacks keep mounting. See which exploits may be putting your business and your clients at risk.
With UX, speed and quality all balanced on the edge of a pin, can development teams still protect their software from supply chain cyber-attacks?
News of stronger attacks and more advanced defensive tools top this month’s security update.
IoT is increasingly permeating every aspect of consumer and enterprise activities. With the growth of microelectronics, ubiquitous connectivity, and cognition (predictive computing), IoT is poised for rapid growth. Whether malicious or accidental, malfunctioning IoT devices, such as a connected car or components of a smart grid, can pose a...
It’s never been more important to update legacy IT, follow security standards and best practices, eliminate ways to avoid using strong passwords, and patch vulnerabilities quickly.
May 2023 Security Update: Take a New Perspective on Ransomware Recovery, Insider Threats, and AI Malware Review
Security news underscores the need to review risk and data loss mitigation and response plans and adapt to evolving threat activity.
Ensure your applications and customers don’t fall prey to these common IoT security missteps.
CA Veracode’s Latest State of Software Security Report Finds Organizations Implementing DevSecOps Address Flaws 11x Faster Than Others
First Veracode analysis of flaw persistence finds 1 in 4 flaws remain open more than a year after discovery
Without robust modern cloud security measures, ISVs face the looming (and inevitable) threat of catastrophic cyberattacks.