Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloud Infrastructure Security: 7 Best Practices to Protect Your Cloud Data

Most likely, your organization leverages cloud computing because of its practical advantages: flexibility, rapid deployment, cost efficiency, scalability, and storage capacity. But do you put enough effort into ensuring the cybersecurity of your cloud infrastructure? You should, as data breaches and leaks, intellectual property theft, and compromise of trade secrets are still possible in the cloud.

Security as a Service (SECaaS) and How it Can Benefit Your Business

Businesses are increasingly recognizing the advantages of adopting a more flexible approach to safeguarding their data, systems and reputation in order to move beyond the limitations of traditional security solutions. In this article, we will discuss how these advantages are delivered by security as a service (SECaaS), its benefits compared with in-house solutions, and what to look for in a potential SECaas provider.

"AI is only useful when it solves real customer problems": Tines on Risky Biz

We’re all huge fans of the Risky Biz podcast here at Tines, so we were thrilled to be invited to appear on the show recently to talk about AI’s role in security automation. I had a great conversation with host Patrick Gray about the security and privacy challenges that go along with deploying an LLM in your environment, and how our approach to AI in Tines is fundamentally different. I loved every minute of this chat, and I hope you’ll find it interesting, too.

The Road to CTEM, Part 2: The Role of Continuous Validation

Many acronyms and security concepts come and go without much traction, but the term continuous threat exposure management (CTEM) seems to be taking hold for the foreseeable future. CTEM, a term originally coined by Gartner, offers a cyclical approach to finding and mitigating threat exposure—which is the accessibility and exploitability of digital and physical assets—in an ongoing, proactive, and prioritized way.

Visibility in Management: Navigating the Cybersecurity Landscape with Argo | Part II

Jerald Dawkins is the Chief Technology Officer (CTO) for CISO Global and has founded and exited several cybersecurity companies, including True Digital Security and TokenEx, LLC, both based in Oklahoma. (True Digital Security was acquired by CISO Global in January 2022.) He currently holds three (3) patents in the cybersecurity field.

IDrive Review 2024 and Alternative Ways to Back Up Your Files

Without the proper security measures, our data can be vulnerable to hardware failures, accidental deletions, cyberattacks, or data breaches. To prevent these nightmares from happening to your files, one of the best options you have is to choose a backup solution to ensure you always have your files protected in case the worst happens. For this reason, many people choose IDrive, an online backup service for Windows, Mac, iOS, and Android users.

Why "vulnerability management" falls short in modern application security

Faced with the growing complexity of software development environments, combined with expanding cyber threats and regulatory requirements, AppSec teams find themselves grappling with a daunting array of challenges. While the advent and subsequent adoption of "shift left" methodologies marks a significant and necessary step forward, it is now evident that this approach requires an accompanying mindset shift.

4 AI coding risks and how to address them

96% of developers use AI coding tools to generate code, detect bugs, and offer documentation or coding suggestions. Developers rely on tools like ChatGPT and GitHub Copilot so much that roughly 80% of them bypass security protocols to use them. That means that whether you discourage AI-generated code in your organization or not, developers will probably use it. And it comes with its fair share of risks. On one hand, AI-generated code helps developers save time.