newsAndroxgh0st botnet integrates Mozi payloads to target IoT devicesThe malware has added exploits for more web applications and devices to its arsenal and some of them seem to be inherited from an older botnet called Mozi.By Lucian Constantin08 Nov 20245 minsBotnetsThreat and Vulnerability ManagementVulnerabilities news US consumer protection agency bans employee mobile calls amid Chinese hack fearsBy Gyana Swain08 Nov 20244 minsHackingopinion Choosing AI: the 7 categories cybersecurity decision-makers need to understandBy Christopher Whyte08 Nov 202410 minsCSO and CISOSecurity PracticesSecurity Software newsThe US Department of Defense has finalized cyber rules for its suppliers By John P. Mello Jr. 08 Nov 20245 minsRegulationAerospace and Defense IndustryGovernment newsCisco IoT wireless access points hit by severe command injection flawBy John E. Dunn 07 Nov 20241 minWireless SecurityNetwork SecurityVulnerabilities brandpostSponsored by Microsoft SecurityWhy AI is the final missing piece of the CNAPP puzzleBy Ron Matchoro, Head of Product, Microsoft Defender for Cloud – Data & AI Security 07 Nov 20245 minsCloud Security newsBeware malicious NPM packages, Checkmarx warnsBy John E. Dunn 07 Nov 20241 minApplication Security newsInfostealers are using BYOVD to steal critical system dataBy Shweta Sharma 07 Nov 20243 minsVulnerabilitiesSecurity featureTop 5 security mistakes software developers makeBy David Strom 07 Nov 202410 minsDevSecOpsApplication Security ArticlesbrandpostSponsored by Microsoft SecurityGenerative AI is reshaping security risk. Zero Trust can help manage itNavigating the evolving landscape of AI adoption while balancing robust data security can be a tough balancing act—here’s how it’s done.By Mark Simos, Lead Cybersecurity Architect, Microsoft 30 Oct 2024 5 minsArtificial IntelligenceSecuritynewsUS targets advanced AI and cloud firms with new reporting proposalThis, along with other AI regulations, sparks worries for enterprises about escalating compliance costs and curbing innovation.By Prasanth Aby Thomas 10 Sep 2024 1 minRegulationArtificial IntelligencenewsF5, Intel team up to boost AI delivery, security F5 and Intel are working together to combine security and traffic-management capabilities from F5’s NGINX Plus suite with Intel’s OpenVINO open-source toolkit for optimizing AI inference and Intel IPU hardware accelerators.By Michael Cooney 29 Aug 2024 1 minNetwork SecurityArtificial IntelligenceSecuritynewsCisco snaps up AI security player Robust IntelligencePlans call for integrating Robust Intelligence's AI security platform with Cisco Security Cloud to streamline threat protection for AI applications and models and increase visibility into AI traffic.By Ann Bednarz 28 Aug 2024 1 minMergers and AcquisitionsArtificial IntelligenceSecuritybrandpostSponsored by Palo Alto NetworksThe growing dichotomy of AI-powered code in cloud-native securityUnveiling the duality: Harnessing AI's potential while safeguarding cloud-native securityBy Amol Mathur, SVP & GM of Prisma Cloud, Palo Alto Networks 03 Jun 2024 5 minsArtificial IntelligenceSecuritybrandpostSponsored by SynopsysDon’t be afraid of GenAI code, but don’t trust it until you test itCommon sense prevails: Use GenAI for routine and repetitive coding tasks, but leave the bespoke and intricate segments of an application to humans. Test GenAI with the same rigor that any other software code requires. By Taylor Armerding, Security Advocate at Synopsys Software Integrity Group 22 Apr 2024 5 minsArtificial IntelligencebrandpostSponsored by FortinetTo defeat AI attacks, fight fire with more fireBy Derek Manky, Chief Security Strategist & Global Vice President of Threat Intelligence, FortiGuard Labs 29 Feb 2024 6 minsArtificial IntelligencebrandpostSponsored by Palo Alto Networks3 guiding principles of data security in the AI eraIf organizations do not have the appropriate security protections in place, they instantly become a prime target for cybercriminals. It’s time to confidently explore and innovate with AI without fear of compromising the organization as a whole. By Dan Benjamin, Sr. Director of Product Management, Palo Alto Networks 27 Feb 2024 4 minsArtificial IntelligencenewsGoogle launches a slew of AI initiatives to enhance cybersecurityThe company also announced $2 million in research grants and strategic partnerships to support research at several institutes, including The University of Chicago, Carnegie Mellon, and Stanford. By Gagandeep Kaur 16 Feb 2024 3 minsArtificial IntelligencebrandpostSponsored by Palo Alto NetworksAI Predictions for 2024: Moving forward with precise systems that combine power, security, intelligence, and ease of use.The best is yet to come…join us for a vital discussion on how cybersecurity coupled with AI will change the rules of the game. Hard truth? More and more attacks will utilize AI.By Dr. May Wang, CTO of IoT Security, Palo Alto Networks 31 Jan 2024 11 minsArtificial IntelligenceopinionDepartment of Defense AI principles have a place in the CISO’s playbookBy Christopher Burgess 06 Jun 2023 5 minsCSO and CISOAerospace and Defense IndustryArtificial IntelligencenewsSAFE Security claims to predict data breaches with new generative AI offeringSAFE Security’s Cyber Risk Cloud of Clouds generates likelihoods for different risk scenarios based on an organization’s cybersecurity posture.By Michael Hill 05 Jun 2023 5 minsThreat and Vulnerability ManagementGenerative AICloud Security Show more Show less View all Upcoming Events21/Nov in-person event FutureIT New York: Building the Digital Business with Cloud, AI and Security21 Nov 2024New York, NY Digital TransformationIT Management View all events Resources whitepaper Data readiness for generative AI Listen in as experts from Ironside’s Data Engineering and Data Science teams explain how to assess your data estate’s readiness for a select genAI projects. The post Data readiness for generative AI appeared first on Whitepaper Repository –. By AWS and Ironside 07 Nov 2024Artificial IntelligenceIT Operations whitepaper Is your data ready for AI and ML? By AWS and Datavail 07 Nov 2024Artificial IntelligenceIT Operations whitepaper Scaling AI Initiatives Responsibly: The Critical Role of an Intelligent Data Infrastructure By NetApp 07 Nov 2024Artificial IntelligenceIT ManagementIT Operations View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote WorkVideo on demand videoCybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with ResilienceTech leaders face mounting uncertainties in cybersecurity and Generative AI. This panel session offers vital insights for tech leaders to protect their organizational data. Drawing upon real-world experiences and industry expertise, our panelists will underscore the imperative for adaptability and proactivity in the face of dynamic threats. With tech and cyber talent shortages exacerbating vulnerabilities, the stakes have never been higher. Panelists will discuss warning signs, stressing adaptability and proactivity against evolving threats. Join us for actionable guidance on cybersecurity infrastructure and resilience in a digital era. 10 Jul 2024 24 minsCSO and CISO LockBit feud with law enforcement feels like a TV drama 05 Mar 2024 56 minsRansomwareArtificial Intelligence Reaping the Benefits of Security Metrics 21 Dec 2023 21 minsCSO and CISO Don’t Lose Your Focus: It’s Not About the AI; It’s About the Data 20 Dec 2023 29 minsCSO and CISO See all videos Explore a topic Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security View all topics All topics Close Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Show me morePopularArticlesPodcastsVideos feature DDoS attacks: Definition, examples, techniques, and how to defend them By Josh Fruhlinger and Lucian Constantin 07 Nov 202411 mins DDoSCyberattacks news Five-country attack on cybercrooks welcomed by security expert By Howard Solomon 06 Nov 20246 mins CybercrimeLegal news Schneider Electric suffers data breach, exposing critical project and user data By Gyana Swain 06 Nov 20244 mins Data Breach podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 1) 04 Nov 202419 mins Supply ChainCritical InfrastructureSecurity video CSO Executive Sessions: Standard Chartered’s Alvaro Garrido on cybersecurity in the financial services industry 23 Oct 202410 mins Financial Services IndustrySecurity video CSO Executive Sessions: New World Development’s Dicky Wong on securing critical infrastructure 16 Oct 202412 mins Critical InfrastructureSecurity