Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unpacking the new US executive order on artificial intelligence

On Monday, October 30, President Biden signed the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence — the longest in history at 117 pages. The executive order (EO) aims to advance and regulate artificial intelligence (AI) in the US. This landmark order pulls together a number of priorities that influence not just the AI industry, but also society at large.

Hybrid network security: Azure Firewall and AlgoSec solutions

In today’s dynamic digital landscape, the security of hybrid networks has taken center stage. As organizations increasingly adopt cloud solutions, like Azure, the complexities of securing hybrid networks have grown significantly. In this blog post, we’ll provide an overview of the key products and solutions presented in the recent webinar with Microsoft, highlighting how they address these challenges.

Embracing Our AI Overlords: Exploring the Future of Artificial Intelligence and Self-Preservation

Step into a world where humor meets technology, and we explore the idea of "Embracing Our AI Overlords." In this entertaining and thought-provoking video, we venture into a whimsical vision of the future where artificial intelligence reigns supreme, all while maintaining a sense of lightheartedness.

Using a Password Manager When Changing iPhones

You should use a password manager when upgrading to a new iPhone because it will make transferring all your account credentials more seamless and you’ll be able to update any weak passwords, making your accounts more secure. Although Apple provides a built-in password manager, iCloud Keychain is not as safe as using a dedicated password manager. A password manager offers more security and convenience to store, manage and share your personal information.

Cloud Threats Memo: Multiple DarkGate Loader Campaigns Exploiting Legitimate Cloud Services

DarkGate Loader is a commodity malware loader with multiple features including the ability to download and execute files to memory, a Hidden Virtual Network Computing (HVNC) module, keylogging, information-stealing capabilities, and privilege escalation. Its distribution mechanism also makes use of legitimate AutoIt files to inject the malicious payload.

The Evolution of IoT Cybersecurity: A 20-Year Journey

Each October, Cybersecurity Awareness Month encourages individuals and organizations to prioritize cybersecurity. This initiative has played a vital role in raising awareness about IoT security and promoting responsible IoT device usage. 2023 marks the 20th anniversary of Cybersecurity Awareness Month, and it seems like the perfect time to reflect on the ever-evolving landscape of IoT (Internet of Things) cybersecurity over the past two decades.

AI Hallucinations and Manipulation: AI Code Vulnerabilities in React and Fastify Node.js (part 2)

AI Hallucinations and Manipulation: AI Code Vulnerabilities in React and Fastify Node.js (part 2) Generative AI can help you write code faster, but is it secure? Learn how you can leverage the power of AI to increase your velocity while mitigating risks and staying secure. Learn from security experts Liran Tal & Simon Maple in a hands-on session where they walk through.

Harnessing the Magic of API: Turbocharging Business Automation

In the bustling metropolis of the modern digital realm, there's a quiet revolution taking place. Businesses, from local startups to multinational corporations, are embracing an unseen hero that propels them to new heights: the Latenode API. But what is this mysterious force, and why is it setting the business world alight?

How AI is Revolutionising Cybersecurity

AI in cybersecurity refers to applying artificial intelligence (AI) techniques and technologies to defend against cyber threats. With the increasing number and complexity of cyber threats, traditional cybersecurity solutions are often insufficient. AI-driven technology, including advanced machine learning algorithms and computational models, has emerged as a powerful tool in the fight against cybercriminals.