Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to choose a security tool for your AI-generated code

“Not another AI tool!” Yes, we hear you. Nevertheless, AI is here to stay and generative AI coding tools, in particular, are causing a headache for security leaders. We discussed why recently in our Why you need a security companion for AI-generated code post. Purchasing a new security tool to secure generative AI code is a weighty consideration. It needs to serve both the needs of your security team and those of your developers, and it needs to have a roadmap to avoid obsolescence.

4 SIEM Price Reduction Tactics Examined

A SIEM’s price can be a bit of a shock. As we’ve covered in another blog, the price of a security information and event management (SIEM) solution is never just about licensing (or whatever you initially agree to pay a vendor for data processing). Even though SIEM licensing costs can easily be tens of thousands of pounds for a small organisation with less than 20 GB of monthly data flow.

PCI DSS Requirement 1 - Changes from v3.2.1 to v4.0 Explained

As we all know, data security is a constantly evolving field, and it’s essential to keep up with the latest standards and requirements. And mark your calendars, because the current PCI DSS v3.2.1 is set to retire on March 31st, 2024. That’s right, the PCI Security Standards Council (SSC) has announced the release of the new and improved PCI DSS v4.0, and compliance with this updated version is mandatory for organizations to maintain data security.

Interview With James Rees, MD of Razorthorn Security

In SafetyDetectives‘ recent interview with James Rees, the Managing Director of Razorthorn Security, he provided insights into the company’s unique approach to cybersecurity consultancy and its evolution in response to the changing landscape. Established 17 years ago during a period of upheaval in the information security field, Razorthorn Security prioritizes customer satisfaction, fostering a customer-centric approach that has contributed to a high client retention rate.

Understanding Six Popular Azure Storage Types and Their Use Cases

The modern enterprise is all about the cloud. Digital transformation includes not only the adoption of cloud computing through application migration, but a transition from disk storage to cloud storage. Cloud storage has some key advantages over traditional disk storage, including the following: While there are multiple cloud storage options available today, including Amazon Web Services (AWS), Azure Storage is a logical choice for Microsoft Azure customers.

2024 Vision: Unveiling the Top Threat Intelligence Predictions That Will Shape the Future

Well, it’s that time of year again. With the new year comes new predictions. Sometimes it seems that these posts can simply be a cut-and-paste job from year to year. I’m going to do my best to avoid that here. Let’s take a look back on some of our past predictions.

Non-repudiation: Your Virtual Shield in Cybersecurity

In the digital world, where countless users communicate, share data, and engage in diverse activities, determining the origin and actions behind these interactions can be quite challenging. This is where non-repudiation steps in. Coupling other security factors, such as delivery proof, identity verification, and a digital signature, creates non-repudiation. This guarantees that the parties involved in the transmission are unable to renounce the execution of an action.