Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Introducing the Wallarm Q1 2024 API ThreatStats Report

As we have in previous editions of the ThreatStats report, we highlight the industry’s top API-related attacks and trends. New to this version, however, is a detailed analysis of API attacks targeting AI-based applications, representing a new and rapidly expanding threat vector. And while we encourage you to download the full report, here are some key observations about what you’ll find within. API threats to AI applications are clearly on the rise.

Volatile Data Acquisition from Live Linux Systems: Part I

In the domain of digital forensics, volatile data assumes a paramount role, characterized by its ephemeral nature. Analogous to fleeting whispers in a bustling city, volatile data in Linux systems resides transiently within the Random Access Memory (RAM), encapsulating critical system configurations, active network connections, running processes, and traces of user activities. Once a Linux machine powers down, this ephemeral reservoir of information dissipates swiftly, rendering it irretrievable.

Introducing Polaris Assist: Your virtual security assistant | Synopsys

Polaris Assist is a virtual assistant that combines generative AI with decades of Synopsys curated real-world vulnerability, risk, and secure coding data to simplify and streamline application security. Polaris Assist AI capabilities will first be introduced on the Polaris Software Integrity Platform by analyzing static analysis data.

TrustCloud Product Updates: April 2024

You know us: Every month we’re cooking up something new! Here are the updates that hit TrustCloud this month. TrustShare GraphAI will answer questionnaires for you with accurate, high-quality responses. TrustShare is getting a huge AI glow up. GraphAI’s generative AI capabilities will now fill in answers that are more context aware, more natural, and more accurate than ever before.

Preventing Magecart Attacks Through Supply Chain Vulnerabilities

The digital supply chain refers to the chain of third-party digital tools, services and infrastructure that is depended on for a particular first-party service (such as your website or SaaS platform). In an ever-changing digital landscape, supply chains can be brittle with many unseen risks. The nature of supply chain risk is transitive; any part of the often long and complicated digital supply chain can be compromised, causing all components downstream of it to also be compromised.

Accelerating AI Adoption: AI Workload Security for CNAPP

When it comes to securing applications in the cloud, adaptation is not just a strategy but a necessity. We’re currently experiencing a monumental shift driven by the mass adoption of AI, fundamentally changing the way companies operate. From optimizing efficiency through automation to transforming the customer experience with speed and personalization, AI has empowered developers with exciting new capabilities.

The 443 Podcast, Ep. 286 - BatBadBut What?

This week on #the443podcast, we cover a research post describing a code injection vulnerability caused by how nearly every high-level programming language runs on Windows. We also discuss a series of vulnerabilities in LG televisions that allow remote attackers to root the device before ending with a chat about new adversarial tactics for delivering malware via GitHub.

Introducing ISO 42001 and NIST RMF Frameworks

While AI has created exciting new opportunities for business, it has created urgent questions around ethics, responsible use, development, and management. AI also introduces a new, and often nebulous, element of organizational risk. With the introduction of two frameworks, ISO 42001 and NIST AI RMF, companies can now implement, demonstrate, track, and build their responsibility and trust around AI. TrustCloud is very pleased to announce that we support both ISO 42001 and NIST AI RMF.

Keeper Webinar: Building a Robust Governance, Risk & Compliance Framework: Challenges & Solutions

IT Compliance doesn't have to be chaotic. Join Teresa Rothaar, Keeper Security's Governance Risk & Compliance Senior Analyst, in this webinar for ActualTech Media on the challenges and solutions to build a robust GRC framework. Keeper helps every organization get full visibility and control over employee password strength, credential sharing, permissions, zero-trust network access and dark web exposure, strengthening auditing and compliance for HIPAA, PCI DSS, SOX, GDPR, CCPA and more.