China pairs cyber and kinetic attacks in the South Pacific as it continues to wrangle control of the South China Sea.
Read moreCISA expects to extend this program to include up to 100 critical infrastructure entities in its first year.
Read moreExploited Vulnerabilities Can Take Months to Make KEV List
November 21 2023The Known Exploited Vulnerabilities (KEV) catalog is a high-quality source of information on software flaws being exploited in the wild, but updates are often delayed, so companies need other...
Read moreEnterprise Generative AI Enters Its Citizen Development Era
November 21 2023Your business users are building Copilots and GPTs with your enterprise data. What can you do about it?
Read moreSaudi Arabia Arms Public Sector With Google Cloud Services
November 21 2023Chronicle CyberShield will be offered as a managed service with security monitoring and Mandiant incident response included.
Read moreHow the Evolving Role of the CISO Impacts Cybersecurity Startups
November 20 2023CISOs and vendors must work together to keep up with emerging threats and find solutions, says a group of CISOs and security entrepreneurs.
Read moreUsing Generative AI for Surveillance
November 20 2023Generative AI is going to be a powerful tool for data analysis and summarization. Here’s an example of it being used for sentiment analysis. My guess is that it...
Read moreCombining a malware sandbox with threat intelligence feeds improves security detection, analysis, and response capabilities.
Read moreA Detection and Response Benchmark Designed for the Cloud
November 20 2023Does your security operation center's performance meet the 5/5/5 benchmark for cloud threat detection and incident response?
Read moreHackers Weaponize SEC Disclosure Rules Against Corporate Targets
November 18 2023Ransomware group BlackCat/ALPHV files SEC complaint against its latest victim, putting an audacious new twist on cyber extortion tactics.
Read more
Recent Comments