97% of breaches involve humans, but where’s the budget? Amy and Jemma call out the disconnect between security spend and actual risk – and what needs to change.
In a world where data provides companies with a competitive advantage, sharing it amongst other businesses, especially in the same industry, may seem counterproductive. However, in cybersecurity, where every company is a potential target for threat actors and organizations are increasingly interconnected through supply chains, sharing information can significantly enhance a company's security posture and overall resilience.
Did you know? AI tools like ChatGPT, Bard, and Copilot are now being used with business platforms like Microsoft 365, Slack, and Zoom — often without your IT team even knowing! , ’ : : If you're an IT admin, cybersecurity professional, or just someone curious about the intersection of AI and cybersecurity, this video will help you understand the risks and how to stay one step ahead.
The Internet of Things (IoT) has fundamentally transformed how devices connect and communicate across networks, but this connectivity brings unprecedented security challenges. At the heart of securing IoT ecosystems lies device certificate management – a critical component that ensures authentic device identity and secure communications through Public Key Infrastructure (PKI).
In the fast-paced world of modern business, security processes have become a cornerstone of an organization’s risk management strategy. As companies navigate increasingly complex threat landscapes, the pressure mounts to enhance security while keeping pace with business innovation. Integrating artificial intelligence (AI) into security review workflows is emerging as a practical solution to reducing review times, lowering costs, and improving system reliability.
Dependency management is one of the biggest challenges in modern software development. Large projects often rely on dozens or even hundreds of libraries. Each one can introduce new vulnerabilities or even malicious code. Attackers sometimes upload fake packages to popular open-source repositories, hoping that build systems will download these packages automatically. This problem is made worse by transitive dependencies, where a single library might include several other libraries under the hood.
Ivan Kam understands that awareness is just the first step. When it comes to cyber threats, it's action that makes the difference. Keeper helps protect your information, before it's too late.
Want your people to click less? Try culture, not trickery. Amy and Jemma explain why most phishing simulations teach the *wrong* lessons – and how we can do better.
Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.