Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Are the Security Implications of AI Coding?

AI coding is here, and it’s transforming the way we create software. The use of AI in coding is actively revolutionizing the industry and increasing developer productivity by 55%. However, just because we can use AI in coding doesn't mean we should adopt it blindly without considering the potential risks and unintended consequences.

Top 10 Cybersecurity Frameworks for the Financial Industry

A healthy financial sector is essential for economic stability and security. Cybersecurity frameworks can help financial organizations meet the requirements of financial regulations and ensure that the financial system operates safely and securely while protecting the rights and privacy of consumers.

How to Protect Your Company's Social Media Passwords From Cybercriminals

All businesses, regardless of size or industry, are potential targets for cybercriminals. As businesses become more aware of the importance of password security in preventing data breaches, they focus on the most obvious areas of weakness, such as employee email accounts and network passwords. However, social media passwords present unique security challenges that organizations may be ill-prepared to handle.

Webinar Replay: Active Assailant Preparedness Webcast with Security and Risk Management Experts

In this webcast, Kroll Managing Directors Matthew Dumpert, Daniel Linskey and Sherine Ebadi and Crisp Vice President Jon Best shared their unique perspectives on active assailant incidents as former law enforcement and government leaders and discuss how organizations can prioritize workplace safety by focusing on, detecting and mitigating potential threats before they manifest in tragic violence.

Secure the Lifeblood of the American Economy

Small and medium-sized businesses account for 4.17 percent of private sector employees and almost half of the United States’ gross domestic product , yet—due to limited finances, resources, and staff—many have difficulties when it comes to supply chain management. Geopolitics, inflation, and worker shortages are just a few variables that can impact supply chains; 86% of SMB supply chains have already been or expect to be impacted by Russia’s war in Ukraine.

EP 25 - Cisco CX Cloud CISO on the Language of Risk

We all accept a certain degree of risk in our lives. So, to varying degrees, we’re all operating – to use cybersecurity parlance – with an assume breach mindset. Meaning, we accept that attacks are inevitable and, as such, we focus time and effort on protecting the assets that matter most. In short, we buckle up for safety.

RKVST Track and Trace Demo

This demo is an example of how RKVST was used to collect information from different databases and different suppliers to form a single source of truth for the full lifecycle of an asset - which in this case is a disposal container for nuclear waste. RKVST provenance-as-a-service enables organizations to authenticate data and build trustworthy digital supply chains. It also makes it quick and easy to locate an asset.

Cloudflare One named in Gartner Magic Quadrant for Security Service Edge

Gartner has recognized Cloudflare in the 2023 “Gartner® Magic Quadrant™ for Security Service Edge (SSE)” report for its ability to execute and completeness of vision. We are excited to share that the Cloudflare Zero Trust solution, part of our Cloudflare One platform, is one of only ten vendors recognized in the report. Of the 10 companies named to this year’s Gartner® Magic Quadrant™ report, Cloudflare is the only new vendor addition.