Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Rise of AI in Email Threats: What 2024's Actors are Deploying

The Evolution of Email Threats Email has long been a favored vector for cyber attacks. From the early days of simple phishing scams to the more advanced spear-phishing campaigns, email threats have consistently evolved. However, the integration of AI has brought about a paradigm shift in both the complexity and frequency of these attacks. AI-Powered Phishing Phishing attacks have traditionally relied on mass-distribution strategies, hoping to catch a small percentage of victims.

AI Security Risks and Recommendations: Demystifying the AI Box of Magic

Explore Our Latest Insights on Artificial Intelligence (AI). Learn More. It is easy to assume that large language models (LLMs) and generative AI (GenAI) security products are a mysterious box of magic. While, in general, interactions with these models are abstract; you make an API call to a remote endpoint and receive a response without much exposure to the security controls around the model, there are security risks of AI to consider when using them.

5 tips for adopting AI code assistance securely

There’s been a lot of excitement around generative AI technology over the past few years, especially in software development. Developers of all levels are turning to AI tools, such as GitHub Copilot, Amazon CodeWhisperer, and OpenAI’s ChatGPT, to support their coding efforts. In fact, GitHub found that 92% of developers use AI coding tools. However, many businesses are realizing that they need to be more cautious when using AI in software development.

Cloudflare acquires BastionZero to extend Zero Trust access to IT infrastructure

We’re excited to announce that BastionZero, a Zero Trust infrastructure access platform, has joined Cloudflare. This acquisition extends our Zero Trust Network Access (ZTNA) flows with native access management for infrastructure like servers, Kubernetes clusters, and databases.

Rakuten Drive: Secure, but Private File Transfer and Cloud Storage?

Are you looking to try a new service to transfer large files of up to 50GB? Then there’s a new player in the file-sharing market that may interest you — Rakuten Drive. In February 2024, Rakuten announced the commercial launch of Rakuten Drive, a file storage cloud service based in Japan. Rakuten Drive allows individuals and enterprises to send large files with customized access controls, store, and edit Microsoft documents.

Maximizing Security: A Complete Guide to IAM Zero Trust Principles

In a security landscape that no longer tolerates assumptions of trust, IAM Zero Trust offers a stringent approach to protect your network. Discover how to apply ‘never trust, always verify’ effectively in our comprehensive look at IAM Zero Trust principles.

Mastering Identity and Access Management Policies: A Comprehensive Guide

How can your business develop and maintain identity and access management policies that safeguard your digital assets while providing appropriate access levels? In this guide, we explore the key elements of IAM policies, their critical role in organisational security, and offer actionable insights for crafting policies that align with both business needs and regulatory demands.

Advanced Threat Protection for Apps Built Using AI

AI has undoubtedly revolutionized various industries, enhancing both efficiency and innovation through low-code and no-code platforms. Yet, this ease of development brings with it an increased burden of security. As business users and developers rapidly build applications, automations, and bots using AI, the complexity and volume of these creations amplify potential security vulnerabilities.

How Are SMEs Approaching AI?

Have you heard about AI yet? Just kidding. We know you have. Recently, AI’s popularity has skyrocketed among businesses and consumers alike. This surge was driven by a combination of technological advancements (e.g., machine learning, natural language processing, and data analytics) with an increase in tool accessibility and user-friendliness.