Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fixing Fix Fatigue: Building Developer Trust for Secure AI Code

AI coding assistants are transforming the way developers work. With a prompt and a click, entire blocks of logic appear, boilerplate fades into the background, and velocity shoots up. But as anyone who’s integrated these tools into their daily routine can tell you, increased speed can come with increased risk. Vulnerabilities sneak in. Fixes pile up. And somewhere in the blur, developer trust begins to erode.

Eliminate the BOREDOM and Focus on the FUN: How to Use OpenAI Codex Cloud

In this video, I dive into OpenAI's Codex Cloud, showcasing how you can write, edit, and run code with the power of AI—directly in your browser. Whether you're a developer, student, or just curious about what AI can do for coding, this walkthrough gives you a hands-on look at how Codex Cloud makes programming faster, smarter, and easier.

The SOC of Tomorrow Delivered Today: MDR and AI for MSPs

Think building a SOC is out of reach? Think again. With MDR and AI working together, MSPs can now deliver 24/7 protection through what’s becoming an autonomous SOC – one that scales without increasing overhead or alert fatigue. This webinar will show how the modern SOC is already within reach, and how to start offering it. You’ll learn.

Why AI Security is Suddenly a Big Deal

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

AI Hackers Are Dumber Than You Think (Here's Proof)

Everyone's panicking about AI-powered cyber attacks, but here's what's ACTUALLY happening... Perfect grammar in phishing emails (bye-bye typos!) AI helping write basic malware code NOT some sci-fi hacking revolution The funniest part? Researchers found hackers literally leaving AI tool COMMENTS in their malware code It's like leaving a sticky note that says "ChatGPT helped me write this virus".

Trustwave DbProtect Expands to Secure Snowflake: Strengthening AI Repository Protection

Trustwave's database protection solution, DbProtect, now supports Snowflake, which is a popular, cloud-based data warehousing platform used by organizations to power AI models and data-driven workflows. Snowflake's cloud-based architecture separates storage and compute functions, allowing organizations to scale each independently. The platform's ability to handle both structured and semi-structured data makes it a preferred choice for a broad range of AI and analytics applications.

Automation and AI in Cybersecurity: $2.22 Million in Savings

Over 2024, the average global cost of a data breach reached $4.88 million. This is 10% up from the previous year and the highest amount to date. These figures, published in the Cost of Data Breach Report 2024, also reveal that companies implementing artificial intelligence and automation in their cybersecurity strategies saved an average of $2.22 million compared to businesses that did not adopt them.

Securing the Future of Generative AI: Why Security Can't Keep Pace with Innovation

By James Rees, MD, Razorthorn Security The artificial intelligence revolution isn’t coming. It’s here and it’s moving faster than anyone predicted. Children now trust ChatGPT more than their parents for information. AI-generated content is becoming indistinguishable from human work. Entire industries are being reshaped by technology that seemed like science fiction just a few years ago.

How agentic AI could transform enterprise workflows: Insights from MIT GenAI Lab

The line between human and machine is blurring—and it’s not a question of whether machines can do more, but how far we’re willing to let them go. The frontier lies in tackling the chaos and solving the fragmented processes that slow enterprises: siloed rulebooks, scattered pricing spreadsheets, and manual approvals.