Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Optimizing Efficiency: How Autonomous Mobile Robotics Improves Manufacturing Processes

Manufacturing technology has continuously advanced from the early days of manual assembly lines to the present when powerful machinery reigns. However, one of the most revolutionary advancements that is changing the way products are made is the integration of autonomous mobile robotics (AMR) into production environments. Autonomous mobile robotics are designed to improve process flow by performing a variety of tasks that were once handled by humans, from transporting materials across a facility to assisting with complex assembly operations.

Why Embrace a Cloud Operating Model?

Taking on the concept of a cloud operating model is not just for people who want to be fashionable; it's a clever tactic that any business can use if they desire efficient scaling and better service delivery. This method uses the benefits of cloud computing to make operations simpler, more flexible and less costly.

What is Azure Identity Protection and 7 Steps to a Seamless Setup

Protecting credentials has become increasingly critical in recent years, with everyday employees using more passwords, devices, and systems than ever before. Remote work has significantly increased the risk of identity attacks. 55% of remote workers say they receive more phishing emails than they used to while working in the office and attempted password attacks are up tenfold. In 2023, Microsoft detected 156,000 business email compromise (BEC) attacks every day over twelve months.

The ethical considerations for AI-powered software testing

As AI integrates into every stage of the SDLC, the area of software testing is undergoing transformative and unprecedented changes. In this article, we will discuss the ethical considerations for AI-powered software testing, examining the advantages and potential hurdles generative AI presents as a new technology being applied across the SDLC.

Vulnerabilities in BIG-IP Next Central Manager allows control of managed devices

In May 2024, new vulnerabilities have been identified in BIG-IP Next Central Manager, raising considerable security concerns. This discovery follows closely on the heels of a critical vulnerability revealed in April within Palo Alto's firewalls with enabled GlobalProtect feature, which permitted unauthorized command execution. These recent findings underscore the persistent challenges in ensuring cybersecurity defenses and prompt updates for security solutions themselves.

Teaser. Half a Century of Connectivity: Celebrating 50 Years of TCP

In May 1974, 50 years ago, Vint Cerf and Bob Kahn made history with their paper on TCP (Transmission Control Protocol) published by @IEEEorg. Here is a teaser of a longer video (and "This Week in Net" episode) coming soon from our protocol experts, Mark Nottingham (Australia), and Lucas Pardue (UK).

Teamwork for Internet security: Rapid response & compliance

Host João Tomé is joined by two guests. First, we have Ranee Bray, Chief of Staff of our Security Team, discussing how we managed programmatically what we called Code Red — several teams were put together to focus in 30 days on strengthening, validating, and remediating a security incident. Credential management, software hardening, vulnerability management, additional alerting, and other areas were also a part of the “Code Red” effort.

The Double-Edged Sword of Artificial Intelligence (AI) in Cybersecurity

As artificial intelligence (AI) continues to advance, its impact on cybersecurity grows more significant. AI is an incredibly powerful tool in the hands of both cyber attackers and defenders, playing a pivotal role in the evolving landscape of digital threats and security defense mechanisms. In this blog, let’s explore the ways AI is employed by attackers to conduct cyber attacks, and how defenders are using AI to deter and counter threats.

New Charlotte AI Innovations Enable Prompt Collaboration and Demystify Script Analysis

Since CrowdStrike Charlotte AI became generally available, we’ve seen firsthand how genAI can transform security operations, enabling teams to save hours across time-sensitive tasks and accelerate response to match the speed of modern adversaries.