Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Meet Spark, an AI Test Agent That Autonomously Uncovers Vulnerabilities

We’re thrilled to announce the general availability of Spark, an AI Test Agent that lowers the entry barrier to white-box fuzz testing. In this blog, we explain how Spark works and share the main results from its beta testing that prove its effectiveness.

"SOAR isn't obsolete, it's just maturing": Tracking SOAR's AI evolution with Tines and GigaOm

In a recent webinar on SOAR’s evolving role in security and beyond, I chatted with Andrew Green, Networking & Security Research Analyst at GigaOm. We kicked things off with a brief discussion on Gartner’s Hype Cycle for ITSM report, which described the SOAR category as “obsolete” and prompted some commenters to declare that SOAR is “dead”.

Why AI Integration is Essential for Modern Call Center Success

Modern call centers face unprecedented challenges in meeting customer expectations while maintaining operational efficiency. The evolution of customer service demands has made traditional call center approaches obsolete, pushing organizations to embrace innovative solutions. This comprehensive blog explores how artificial intelligence revolutionizes call center operations, enhances customer experiences, and drives business growth in today's competitive landscape.

AI-powered fraud detection: Protecting financial services with Elastic

Fraud in financial services is becoming more sophisticated, costing the industry billions annually and eroding customer trust. Recently, Deloitte published an article highlighting the risk AI brings in the form of fraudsters to the financial services industry: “Fake content has never been easier to create — or harder to catch. As threats grow, banks can invest in AI and other technologies to help detect fraud and prevent losses.”

Phishing is the Top Security Threat For Smartphone Users

Phishing attacks are the most common security issue for smartphone users, according to a new study by Omdia. The survey found that nearly a quarter (24%) of respondents have fallen victim to a mobile phishing attack. The second most common mobile threat was malware, which is usually delivered via social engineering. The researchers note that phishing attacks reached all the smartphones assessed in the study, regardless of vendor.

Improving AWS security services with Sysdig Secure

One of the primary goals of information security is to protect data, which of course entails protecting the resources that store and provide access to that data. According to the NIST Cybersecurity Framework, organizations need to develop and implement the necessary protections to restrict or mitigate the effect of a possible cybersecurity incident. Security should be integrated right from the source of the cloud architecture design process.