Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Understanding Cyber Insurance Coverage

Cyber attacks are increasing in frequency and severity, with the trend ticking upward year after year. As the volume of attacks continues to rise and threat actors work to evade cybersecurity measures, organizations are increasingly adopting a strategy that helps minimize the effects of a potential breach – risk transfer.

New Phishing Campaign Targets The X Accounts of Politicians, Tech Companies, Cryptocurrency, And More

SentinelOne warns that a phishing campaign is targeting high-profile X accounts, including those belonging to US political figures, leading journalists, major technology companies, cryptocurrency organizations, and owners of coveted usernames. “SentinelLABS’ analysis links this activity to a similar operation from last year that successfully compromised multiple accounts to spread scam content with financial objectives,” the researchers write.

Detect Data Exfiltration Techniques with Falcon Next-Gen SIEM

Sensitive data theft is among adversaries’ most common goals. For defenders, data exfiltration can lead to the compromise of customer data, public exposure of trade secrets, and potentially permanent business and reputational damage. Victims of data exfiltration may also face legal issues for non-compliance with data protection laws. This must be a top concern for businesses.

How to avoid being targeted by a Mobile application Data Breach

Our lives are increasingly intertwined with technology, and apps have become indispensable tools in our daily routines. From ordering groceries with just a few taps on our phones to connecting with loved ones across the globe through video calls, apps have revolutionized the way we live, work, and play. We rely on a variety of apps for everything from productivity and entertainment to health and fitness. For example, we use restaurant discount apps to discover exciting new diners and snag amazing deals on delicious meals.

Speed meets security: Pascal Wehrlein races Cato's Etay Maor

Get ready for a high-speed showdown as ABB FIA Formula E Drivers' Champion Pascal Wehrlein teams up with Etay Maor, Chief Security Strategist at Cato Networks, in a thrilling race on Formula E simulators. Can Etay keep up with Pascal on the track? And can they make the right calls in the world of IT security? Hit play and see who comes out on top! Let’s connect.

How AI-powered Secure Email Gateways Fight Back vs. AI-armed Bad Actors

As bad actors use artificial intelligence to step up their phishing game, mounting an effective defense means using a secure email gateway that likewise employs AI to detect even the most cleverly crafted phishing emails and the fraudulent websites to which the emails attempt to direct recipients. The concern is not just with generative AI (GenAI) tools like ChatGPT, which has some (rather limited) guardrails to prevent nefarious use.

EP 1 - AI Gone Rogue: FuzzyAI and LLM Threats

In the inaugural episode of the Security Matters podcast, host David Puner dives into the world of AI security with CyberArk Labs' Principal Cyber Researcher, Eran Shimony. Discover how FuzzyAI is revolutionizing the protection of large language models (LLMs) by identifying vulnerabilities before attackers can exploit them. Learn about the challenges of securing generative AI and the innovative techniques used to stay ahead of threats. Tune in for an insightful discussion on the future of AI security and the importance of safeguarding LLMs.