Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sysdig's AI Workload Security

AI usage has exploded. In just a few years, it's gone from something the enterprise should track to a powerful technology set we rely on. This sharp rise has created a world of opportunity and a new set of security challenges that we need to be aware of, but not scared of. And that's why I'm excited to share our new AI workload security feature. By understanding where they are running, Sysdig helps you control shadow AI and active AI risk and keeps you ahead of emerging AI regulations because you'll know what AI workloads you have, where they are, and what risks are associated with them.

Using AI to Build Apps & Automations: Top Cybersecurity Concerns

With the democratization of application development, users can now quickly create powerful applications without deep coding skills using AI copilots and low-code/no-code development tools. However, this ease of use can also introduce vulnerabilities, especially since many new developers aren’t well-versed in low-code application security best practices.

Inside RSA Conference & jam.dev (a bug-fixing tool powered by Cloudflare)

This week, host João Tomé heads to San Francisco for the cybersecurity RSA Conference (May 6-9, 2024). First, we gather insights from attendees, ranging from a cybersecurity student on the brink of graduation to seasoned managers and experts. We also feature Cloudflare’s Chief Privacy Officer discussing the nexus of security and privacy. Plus, insights from Carlos Alberto Silva, a Portuguese venture capitalist with extensive experience in cybersecurity investments.

Unlocking AI Ethics: The Brivo Approach to Transparency and Safety

In today's rapidly evolving digital landscape, the integration of artificial intelligence (AI) into our daily lives and businesses is inevitable. At Brivo, we're at the forefront of marrying technology with ethics, ensuring that our smart spaces and access control solutions are not just innovative but also transparent and safe. In this video, we dive deep into the importance of transparency in AI usage, highlighting how it forms the backbone of ethical AI practices.

The Dell API Breach: It could have been prevented

As you may have seen in the news, a hacker stole 49 million customer records from Dell. The attack wasn’t novel or sophisticated. Instead, the attacker used a business logic flaw and an API to scrape 49 million records from Dell. How did they do it? Here is the attack flow. The attacker registered for an account within the Dell ecosystem to be a reseller/partner. They weren’t going to be. But Dell didn’t perform any checks, and within 48 hours, the attacker had a valid account.

Two new checks for the ChatGPT macOS app

With the recent announcement of OpenAI’s ChatGPT desktop application for macOS, users gain access to LLM workflows outside of their browser. ChatGPT’s broad adoption by employees across industries, and around the world, has put employers, compliance, and security teams into high gear as they seek to balance the gains made in productivity with the potential risks of how these tools are being used.

Smartphones: The Usual Suspects in Car Accident Cases

Smartphones have become such an integral part of our way of life that we cannot seem to do anything without them. We're always chatting, answering calls, going through social media, etc., and the most dangerous part is that we even do these things while driving. Such an action can be categorized as distracted driving, which is engaging in other activities as a driver that distract you from paying attention to the road.