Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Code Llama 70B Launch & More - This Week in AI

In a groundbreaking move, Meta has released Code Llama 70B, the latest iteration in its series of open-source code generation models. Code Llama 70B maintains the tradition of an open license, fostering research and commercial innovation. This release builds upon its predecessors, including Llama 2, and is poised to redefine AI-driven code generation. One standout feature in the suite is CodeLlama-70B-Instruct, a finely tuned version explicitly designed for instruction-based tasks.

Unlocking Savings: Migrating to Cloud-Based Access Control Without Breaking the Bank

In the fast-evolving landscape of access control solutions, the shift from legacy on-premise systems to cloud-based access control has become a strategic imperative for businesses seeking efficiency and scalability. However, the associated costs and concerns about swapping out existing proprietary equipment often act as significant barriers to change. Enter Brivo Mercury Solutions – a game-changer in the realm of security system migration.

The Key Features and Benefits of iDeals Board for Streamlined Board Meetings

Today, the need for efficient and secure communication among board members is more critical than ever. As organizations strive for greater agility and sustainability, the reliance on advanced technologies becomes imperative. iDeals Board emerges as a leading solution, offering a comprehensive suite of features to streamline board meetings and enhance collaboration. This article explores the key features and benefits of iDeals Board, a cutting-edge virtual board software.

A Short Guide to Security Monitoring

As organization's IT infrastructures continue to grow in size and complexity, this raises the challenge of guaranteeing security across your resources, systems, and networks. The importance of this is further increased due to data being a valuable commodity in today's world. The loss of data due to a security breach could send seismic repercussions through your entire organization and potentially lead to its demise.

Strengthening Cybersecurity in Local Government

In the ever-evolving cybersecurity landscape, organizations are constantly striving to enhance their defenses against organized malicious actors. As cyber attacks become more advanced, regulatory bodies have created and enforced compliance requirements to ensure that organizations protect sensitive data and systems. One groundbreaking solution that can help your organization meet these challenges is Extended Detection and Response, known as XDR.

How to protect your business from NFT phishing attacks and spam

The Web3 ecosystem has experienced a sharp increase in spam NFTs. While spam NFTs may seem benign – commonly used as promotions for new NFT collections – they can also be used as a method for phishing unsuspecting users. Today, threat actors are using spam NFTs to drain wallets in a variety of ways. In this blog post, we take a closer look at some of these methods and the new security protections Fireblocks has developed to safeguard our customers.

The Crucial Role of Network Penetration Testing in Today's World

In an era dominated by technological advancements and interconnected digital landscapes, the need for robust cybersecurity measures has never been more critical. Cyber threats, attacks, and ransomware incidents continue to rise, targeting organizations of all sizes and industries. In this landscape, network penetration testing has emerged as a vital component of a comprehensive cybersecurity strategy.

Free API Discovery & Threat Detection Tool From Graylog!

In the fast-evolving landscape of digital connectivity, Application Programming Interfaces (APIs) play a pivotal role in facilitating seamless communication between diverse software systems. As organizations increasingly rely on APIs to power their applications, robust API security becomes paramount.

CVE-2024-21893: New Ivanti Zero-Day Vulnerability Actively Exploited

On January 31, 2024, Ivanti published an article disclosing two high severity vulnerabilities: CVE-2024-21893: A server-side request forgery flaw present in the SAML component of Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons. This vulnerability allows an unauthenticated threat actor to access restricted resources. Ivanti reports that a limited number of customers have been affected by this vulnerability.