Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Role of AI in Cybersecurity

Artificial intelligence (AI) is not a new concept or technology in the world of cybersecurity. It’s been iterated and utilized by security professionals for decades. But as both cybersecurity technology and cyber threats continue to advance, AI is being adopted by organizations at a rapid pace, all of whom seek to harness AI’s power to automate, advance, and empower their security.

BYOK vs HYOK: What's the Difference and Which Approach Is Right for You?

As organizations move to the cloud, ensuring robust data security and privacy controls has become a top priority. Encryption is crucial for any organization’s cloud security and data sovereignty strategy; however, who controls the encryption keys can significantly affect the effectiveness of these measures.

Building a Cyber-Aware Workforce: Mexico's Push for Security Training

Last year, Mexico was hit with 324 billion attempted cyberattacks, lending credence to the World Economic Forum's report that the country is the recipient of more than half of all cyber threats in Latin America. This does not bode well for the nation projected to rank 15th in world economies this year. The imperative is clear: Mexico and the businesses it supports need to bolster cybersecurity measures to withstand the disproportionate amount of cyber incidents they may be facing in the next 12 months.

UK Ransomware Payment Ban Implications

The UK will ban public bodies from paying ransoms and introduce new reporting rules for ransomware incidents. Public sector organisations must prepare to recover without paying. Private firms must notify the government if they plan to pay. Attackers may shift focus to private targets and use data leaks over encryption. Organisations need better visibility, response readiness, and tested recovery plans. Payment is no longer a fallback.

The security principles guiding 1Password's approach to AI

AI is transforming the way we work. There are immense opportunities for automation, intelligent decision-making, and productivity gains. This transformation is a tremendous opportunity, but it also comes with tremendous responsibility, especially when security is involved. For example, AI systems can now act on behalf of users, access sensitive data across tools, and make decisions without oversight, all of which have security implications.

CyberArk empowers Australia's cyber resilience with IRAP assessment completion at the protected level

As ransomware strains hospital operations and supply‑chain attacks target energy grids, Australia’s public and regulated sectors need proven cyber resilience. At the heart of most breaches lie human error and weak identity controls, making the Infosec Registered Assessors Program (IRAP) assessment program the gold standard for moving sensitive workloads to the cloud.

'Plague' malware exploits Pluggable Authentication Module to breach Linux systems

‘Plague’ represents a newly identified Linux backdoor that has quietly evaded detection by traditional antivirus solutions for over a year. Its primary mechanism involves operating as a malicious PAM, allowing attackers to silently bypass system authentication and establish persistent SSH access to compromised Linux systems.