CISO Conversations: LinkedIn’s Geoff Belknap and Meta’s Guy Rosen
SecurityWeek interviews Geoff Belknap, CISO at LinkedIn, and Guy Rosen, CISO at Facebook parent company Meta. The post CISO Conversations: LinkedIn’s Geoff Belknap and Meta’s Guy Rosen appeared first...
View ArticleMachine Identity Firm Venafi Readies for the 90-day Certificate Lifecycle
Venafi introduced a 90-Day TLS Readiness solution to help enterprises prepare for Google’s proposed 90-day limit for the lifecycle of a digital certificate. The post Machine Identity Firm Venafi...
View ArticleHorizon3.ai Introduces AI-Assisted Service to Prioritize and Patch...
SaaS-based, AI-assisted penetration service allows proactive defensive action against exploitation of new vulnerabilities. The post Horizon3.ai Introduces AI-Assisted Service to Prioritize and Patch...
View ArticleToken Security Raises $7 Million Seed Funding for Machine-First Identity...
Tel Aviv-based firm emerged from stealth with $7 million seed funding led by TLV Partners with participation from SNR and angel investors. The post Token Security Raises $7 Million Seed Funding for...
View ArticleCriminal Use of AI Growing, But Lags Behind Defenders
When not scamming other criminals, criminals are concentrating on the use of mainstream AI products rather than developing their own AI systems. The post Criminal Use of AI Growing, But Lags Behind...
View ArticleNATO Draws a Cyber Red Line in Tensions With Russia
Weakening liberal democracies and weakening the NATO alliance are conjoined in the hybrid war that Russia is conducting against Ukraine. The post NATO Draws a Cyber Red Line in Tensions With Russia...
View ArticleHacker Conversations: Ron Reiter, and the Making of a Professional Hacker
Ron Reiter was a childhood hacker in Israel. He was recruited into the IDF’s elite Unit 8200 for his military service. Now he is CTO and co-founder of cybersecurity firm Sentra. The post Hacker...
View ArticleBeware – Your Customer Chatbot is Almost Certainly Insecure: Report
As chatbots become more adventurous, the dangers will increase. The post Beware – Your Customer Chatbot is Almost Certainly Insecure: Report appeared first on SecurityWeek.
View ArticleZero-Day Attacks and Supply Chain Compromises Surge, MFA Remains...
Attackers are getting more sophisticated, better armed, and faster. Nothing in Rapid7's 2024 Attack Intelligence Report suggests that this will change. The post Zero-Day Attacks and Supply Chain...
View ArticleNew Endpoint Protection Platform by Cigent Blocks Ransomware at the Data Level
The two primary components to the solution are to encrypt company data at all times, and to decrypt only when the file is required for use. The post New Endpoint Protection Platform by Cigent Blocks...
View ArticleResurgence of Ransomware: Mandiant Observes Sharp Rise in Criminal Extortion...
Mandiant saw an increase in ransomware activity in 2023 compared to 2022, including a 75% increase in posts on data leak sites. The post Resurgence of Ransomware: Mandiant Observes Sharp Rise in...
View ArticleWhy Hackers Love Logs
Log tampering is an almost inevitable part of a compromise. Why and how do cybercriminals target logs, and what can be done to protect them? The post Why Hackers Love Logs appeared first on SecurityWeek.
View ArticleDangerous Liaisons: The Interaction Between Threat Actors and High-Risk Devices
Forescout's 2024 analysis of the riskiest devices highlights vulnerabilities and threat actor interactions across IT, IoT, OT, and IoMT. The post Dangerous Liaisons: The Interaction Between Threat...
View ArticleEdge Devices: The New Frontier for Mass Exploitation Attacks
The increase in mass exploitation involving edge services and devices is likely to worsen. The post Edge Devices: The New Frontier for Mass Exploitation Attacks appeared first on SecurityWeek.
View ArticleAim Security Raises $18M to Secure Customers’ Implementation of AI Apps
Aim Security has raised a total of $28 million to date and is on a mission to help companies to implement AI products with confidence. The post Aim Security Raises $18M to Secure Customers’...
View ArticleNon-human Identity Lifecycle Firm Entro Security Raises $18 Million
Entro’s platform is designed to bring order to the increasingly chaotic management of non-human identities. The post Non-human Identity Lifecycle Firm Entro Security Raises $18 Million appeared first...
View ArticleAI Weights: Securing the Heart and Soft Underbelly of Artificial Intelligence
AI model weights govern outputs from the system, but altered or ‘poisoned’, they can make the output erroneous and, in extremis, useless and dangerous. The post AI Weights: Securing the Heart and Soft...
View ArticleMeta’s Virtual Reality Headset Vulnerable to Ransomware Attacks: Researcher
Researcher shows how hackers could use social engineering to deliver ransomware and other malware to Meta’s Quest 3 VR headset. The post Meta’s Virtual Reality Headset Vulnerable to Ransomware Attacks:...
View ArticleGaining and Retaining Security Talent: A Cheat Sheet for CISOs
Freed from the shackles of always demanding a technical background, the CISO can concentrate on building a diverse team comprising multiple skills. The post Gaining and Retaining Security Talent: A...
View ArticleInside the Mind of a CISO: Survey and Analysis
Inside the Mind of a CISO 2024 is a survey of 209 security leaders to understand the thinking and operational methods and motivations of CISOs. The post Inside the Mind of a CISO: Survey and Analysis...
View Article