Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Salt Announces Bi-directional Integration with Wiz!

We have exciting news to share! Salt Security is building a bi-directional integration with the Wiz cloud security platform! With this announcement, Salt becomes the first API security vendor to build a two-way integration with Wiz, giving Wiz customers the deepest and most actionable insights into API behaviors – all within Wiz’s comprehensive cloud security platform.

AI Biases: Why Achieving Beneficial AI is Challenging

In this video, we delve into the complex issue of AI biases and the challenges they pose in creating a truly beneficial AI system. Join us as we explore the diverse perspectives surrounding the selection of biases in AI models, which often results in different representative AIs even within the same country. We discuss how individuals seek to have their own biases reflected in the AI models they use, or criticize them for perceived biases, highlighting the irony in contrasting approaches between countries like China and other nations. Moreover, we shed light on the elusive quest for objective determination of what's best for the majority, emphasizing the absence of a universally accepted method.

ChatGPT and Data Privacy

In April 2023, German artist Boris Eldagsen won the open creative award for his photographic entry entitled, Pseudomnesia: The Electrician. But, the confusing part of the event for the judges and the audience was that he refused to receive the award. The reason was that the photograph was generated by an Artificial Intelligence (AI) tool.

How To Get Rid of Viruses From Your iPhone

Malware is a persistent problem. As the digital age switched from desktops to handheld devices, so did hackers and other cybercriminals. Expansive enterprise attacks and small-scale phishing attacks now have companies with the inclusion of mobile data mining and virus infections. Your iPhone is no exception.

Snyk integrates with Amazon EventBridge to enable secure AppDev at scale

In today’s highly dynamic application ecosystem, the number and scope of security issues that developers need to address have increased dramatically, making it imperative for modern development teams to have an automated system to handle security events across every application component.

Snyk integrates with AWS Security Hub to automate security remediation workflows

AWS Security Hub is a cloud security posture management platform (CSPM) that automates security best practice checks, aggregates security alerts, and understands your overall security posture across different AWS accounts. AWS Security Hub ingests security findings from other security services like Amazon GuardDuty, Amazon Inspector, Amazon Macie, AWS IAM, and AWS Firewall Manager — as well as findings from partners like Snyk.

Cloud Security Assessment

Cloud security is the practice of protecting data, applications, and infrastructure that reside on cloud computing platforms. This includes Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and other public and private cloud services. It involves implementing security protocols such as encryption, authentication methods, firewalls and access control to help protect the data and applications that are hosted on cloud servers.

Enhancing Mobile App Security through Sandboxing & Isolation

Security Testing is a crucial step in the application development process. So, how about we say you can have a dedicated environment to test your app for potential threats such that the attached malware cannot spread, access, or modify the rest of your system's files, resources, and settings? Pretty lucrative, right? Application Sandbox and isolation technique is the holy grail of application security.

Protecting GraphQL APIs from malicious queries

Starting today, Cloudflare’s API Gateway can protect GraphQL APIs against malicious requests that may cause a denial of service to the origin. In particular, API Gateway will now protect against two of the most common GraphQL abuse vectors: deeply nested queries and queries that request more information than they should.

Forrester: AI, Cloud Computing, and Geopolitics are Emerging Cyberthreats in 2023

Wouldn’t it be great if your cybersecurity strategy only had to focus on just a few threats? Sigh… if only life were that easy. But new predictions for this year’s most prevalent cyber threats from analyst firm Forrester should help focus your efforts.. According to their newly released Top Cybersecurity Threats in 2023 (client access required), there are five threats to be concerned about.