An intelligent application future hinges on using responsible AI Lexy Kassan May 31, 2024 As enthusiasm for AI builds and regulation gains momentum, investing in AI responsibly is not just the right thing to do — it’s competitive. Read More
Living off the land in a victim’s network Matt Malarkey May 31, 2024 Despite sophisticated threat and detection tools, cyber adversaries have proven that they are able to maintain a presence on a victim’s network. Read More
3 ways to safeguard identity and insurance in the age of AI Daniel Bar-Lev May 30, 2024 Three key technologies and practices enable businesses to ensure the health of insurance in the age of generative AI.Read More
70% of CISOs feel vulnerable to a material cyberattack in 2024 Security Staff May 28, 2024 A report surveyed 1,600 CISOs worldwide in order to shed light on their experiences, insights and predictions. Read More
Security leaders are facing a new wave of identity risks Security Staff May 24, 2024 A study has found that increased technological and organizational complexity is contributing to new identity risks that security leaders must manage. Read More
Understand candidate screening data sources Susie Thomson May 23, 2024 All recruitment screening agencies are not equal, so look before you leap. Read More
Financial consequences of ignoring security debt in 2024 Eitan Worcel May 21, 2024 What might have once seemed like an unavoidable security debt is now leaving vulnerabilities open to exploitation and manipulation.Read More
Consolidation is coming to corporate security technology Manish Mehta May 21, 2024 Technology within the corporate security industry is ripe for consolidation and a better way to operate.Read More
Top 5 things CISOs should know to protect their business Dan Rasmussen May 20, 2024 Security leaders should consider these five things that can help them protect the business.Read More
Cyber attribution: Do you really need to know? Nissim Ben Saadon May 17, 2024 Cyber attribution — finding exactly who perpetrated a given cyberattack — has seemingly become a cybersecurity goal in and of itself. But do organizations really need to know?Read More