Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Can AI Be Used to Combat Phishing Attacks

Phishing is not going away—it’s morphing and evolving. As an example, in late 2022 the overnight commodification of artificial intelligence (AI) changed the phishing threat landscape forever, lowering the barrier to entry for novice fraudsters who had previously had the motives, but lacked the means to launch sophisticated scams. ChatGPT and fraud-specific Generative AI tools (like the aptly named FraudGPT and WormGPT) granted malefactors the ability to supercharge and scale their operations.

Network Security and Application Security: The Power Duo of Cybersecurity

In a world with frequent technological changes, maintaining the trustworthiness and protection of your data and systems should be of paramount importance. With technology constantly evolving for the better, dangers and susceptibility could also make your online security more extraordinary. This is where the issues of network security and application security appear, which may be referred to as two complementary subtopics.

UpGuard Summit May 2024 (APAC)

In this quarter's UpGuard Summit, we’re continuing our focus on scaling your Third-Party Risk Management (TPRM) program. Hear how you can eliminate manual work, harness automation and keep up to date with emerging threats. You’ll also learn how security leaders have evolved their TPRM function and the lessons they’ve learnt along the way.

Accelerating Cybersecurity in the Transportation Industry

The transportation industry is not only part of critical infrastructure, but at the nexus of other critical infrastructure sectors that rely on transportation systems to operate reliably. When threat actors put this fundamental function at risk, there’s a ripple effect that disrupts individuals, businesses, government and supply chains.

How to Record SSH Sessions and Monitor User Activity in Linux with Ekran System [Hands-on Guide]

Monitoring user activity on your critical endpoints is a vital part of an effective cybersecurity strategy. Organizations need to monitor both remote and local user sessions to ensure user accountability, manage cybersecurity risks, enable prompt incident response, and comply with relevant cybersecurity laws and regulations. This is a step-by-step guide on how to monitor user activity in Linux and record remote SSH sessions on any endpoint with the Ekran System software agent installed.

AI in Atlassian Tools - Benefits And Possible Risks

Artificial Intelligence is becoming an integral part of our work. It helps us be more productive by automating tasks, analyzing, and boosting the speed of our work. Due to the desire to accelerate work and make it more efficient, SaaS providers integrate AI into their software. For example, Atlassian in 2023 announced Atlassian Intelligence, a combination of state-of-art OpenAI models and the power and data within the Atlassian platform.

The Face of Cybersecurity Excellence: Jess Parnell Wins CISO of The Year

In the world of cybersecurity being proactive is a necessity. Cyber threats loom large, and only those who dare to innovate, lead, and push boundaries can truly make a difference. That’s why it’s no surprise that our very own Jess Parnell, has been named the CISO of the Year in the 2024 Cybersecurity Excellence Awards.

Understanding the NIS 2 Directive

By expanding its scope and introducing modernized requirements, the new NIS 2 Directive challenges organizations to elevate their cyber preparedness. This article explores how the directive affects a wide range of sectors and the critical infrastructure within them, detailing the requirements for compliance and highlighting the key role that IONIX plays in supporting organizations in meeting these regulations.

Random but Memorable - Episode 12.8: The RSA Special

It's our RSA special! Join the podcast gang and 1Password's Chief Product Officer, Steve Won, as we unpack everything that went down at 2024's RSA Conference. Hear all about 1Password's game changing RSA announcement and the reaction, plus we share what the team got up to – straight from the conference floor! Don't worry, just because it's the RSA Special doesn't mean we didn't have time to play a round of Security Blank! But this time with a narcissistic twist...

CISO of the Year Award: Jess Parnell

We are proud to announce that we have won three prestigious Cybersecurity Excellence Awards! Join us in congratulating Jess Parnell for being named CISO of the Year. We are also honored to be recognized for: Most Innovative Cybersecurity Company Intelligence Powered Cybersecurity These awards showcase our unwavering commitment to excellence and innovation in cybersecurity. Thank you to our incredible team and the Centripetal community for their hard work and support. Together, we will continue to push the boundaries of cybersecurity to build a secure digital future.