Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding AI Maturity: Where Are You Today, and Where Do You Want to Be?

By rating your present AI Maturity level and your desired future state, you can create a focused action plan to move forward confidently and securely. AI adoption doesn’t have to be overwhelming, it just requires a clear, intentional approach.

Navigating the New Security Landscape: Asia Pacific Cybersecurity Readiness Survey 2024

A year on from the publication of our inaugural cybersecurity survey in 2023, it is remarkable to see how many of the same issues continue to impact the work of Chief Information Security Officers (CISOs) in the region. In the 2024 edition of the Cloudflare study, we continued to build a better understanding of the threat landscape facing CISOs and their teams across Asia Pacific; with interviews we conducted among almost 4,000 cybersecurity professionals from 14 markets across the region.

Navigating the New Cyber Threat Landscape: Why Irish SMEs Must Think and Act Differently

Let’s be honest, keeping your business safe online feels like a never-ending race these days, especially for Small and Medium Enterprises (SMEs). At Intuity Technologies, we see it every day: the bad guys are getting smarter, faster, and ultimately relentless. With IT budgets often stretched thin, and the digital world constantly developing – it’s tougher than ever for SMEs to stay secure.

GhostGPT, the new malicious chatbot and its impact on cybersecurity

At this juncture, it is no surprise that cybercriminals are leveraging the potential of generative artificial intelligence to strengthen their attacks. However, the emergence of new models specifically designed to generate threats quickly has made this task even easier for bad actors. At the end of 2024, researchers discovered a new AI chatbot created for cybercriminal purposes.

API Threat Trends: How Attackers Are Exploiting Business Logic

As businesses rely more on APIs, attackers are quick to turn that trust into opportunity. Among the most dangerous and difficult-to-detect threats are business logic exploits, which let cybercriminals manipulate legitimate functionality to gain unauthorized access, exfiltrate data, or disrupt operations. These attacks often slip past traditional defenses unnoticed, making them a growing concern for security teams.

Build Trust Now: Transparent Dialogue for a Trustworthy Organization #trust #cybersecurity

Building trust shouldn't start when there's already a problem. Learn how to proactively create transparent, trust-first conversations with customers—and why trust must be engineered into your security programs from the start. Building trust isn't reactive—it’s proactive. Discover how to open transparent conversations before issues arise, why trust must be built into every layer of your security program, and how to communicate that trust effectively during the sales process.