Latest news - Page 79
Tenable extends CNAPP capabilities for enhanced Kubernetes security
Thu, 21st Mar 2024
#
public cloud
#
cloud security
#
open source
Tenable plans to extend its Cloud-Native Application Protection Platform capabilities to Kubernetes in a bid to reduce operational risk.
Recorded Future reveals potential AI exploitation in 2024
Thu, 21st Mar 2024
#
malware
#
llms
#
cybersecurity
Recorded Future warns of looming AI exploitation by cybercriminals in 2024, from using deepfakes to impersonate executives to disinformation campaigns.
Blame culture jeopardising essential business operations
Thu, 21st Mar 2024
#
it departments
#
employment
#
dynatrace
Unhealthy blame culture between IT teams and third-party providers is putting essential business services at risk, reveals Dynatrace.
Gallagher's C7000 wins Outstanding New Security Product award
Thu, 21st Mar 2024
#
firewalls
#
network security
#
breach prevention
Gallagher Security's Controller 7000 (C7000), a cutting-edge security product celebrated for its features, receives its first award for Outstanding New Security Product at the prestigious India and South Asia OSPAs.
i-PRO integrates Docker support in new X Series AI cameras
Wed, 20th Mar 2024
#
virtualisation
#
digital transformation
#
ai
i-PRO Co., the former Panasonic Security, integrates Docker container support into its AI-enabled X Series cameras, facilitating app development, boosting cybersecurity, and enhancing AI component modularity.
Cloud-native security: Best practices vs. convenience and speed
Wed, 20th Mar 2024
#
cloud security
#
application security
#
advanced persistent threat protection
Cloud-native developers prioritise speed and convenience over safety, neglecting best practice and increasing cyber risk, warns Sysdig's annual security report.
How to do private Artificial Intelligence
Wed, 20th Mar 2024
#
datacentre infrastructure
#
hyperscale
#
public cloud
Businesses adopt private AI models, utilising proprietary datasets on private infrastructure, to protect their sensitive data and intellectual property.
How AI is powering the next-generation of cybercriminals
Wed, 20th Mar 2024
#
malware
#
ai
#
cybersecurity
Cybercriminals increasingly harness AI for innovative and harder-to-detect attacks, using tools like ChatGPT to improve malware efficiency, automate phishing attempts and exploit APIs vulnerabilities.
NVIDIA's cuPQC software accelerates move to post-quantum cryptography
Wed, 20th Mar 2024
#
hyperscale
#
public cloud
#
quantum computing
NVIDIA introduces cuPQC, a software solution to hasten the advent of quantum-safe cryptography, capitalising on GPU parallel processing for boosting security algorithm efficacy.
Exclusive: How Aiven is helping businesses prepare for CPS 230
Wed, 20th Mar 2024
#
risk & compliance
#
ai
#
data management
Aiven is providing innovative open-source data platform services to help businesses ready themselves for the impending enforcement of APRA's CPS 230 standard.
Heng Leong Hang adopts CyberArk platform for enhanced cybersecurity
Wed, 20th Mar 2024
#
digital transformation
#
pam
#
advanced persistent threat protection
Taiwanese retail giant, Heng Leong Hang, enhances cyber defence with the integration of CyberArk's Identity Security Platform into its cyber security strategy to protect core systems and customer data.
Human Managed secures ISO/IEC 27001:2022 certification for data security
Wed, 20th Mar 2024
#
data analytics
#
risk & compliance
#
bi
Cloud-native data platform Human Managed secures the distinguished ISO /IEC 27001:2022 certification, affirming robust information security protocols and bolstering trust amongst global clients.
Cato Networks introduces 'network stories' for seamless network incident detection
Wed, 20th Mar 2024
#
soc
#
casb
#
sase
Cato Networks introduces 'network stories' to its SASE Cloud platform, allowing AI-powered detection and response to network incidents, reducing outage duration and improving collaboration between NOC and SOC teams.
Encompass Corporation named 'One to Watch' in FCC50 list by Chartis Research
Tue, 19th Mar 2024
#
digital transformation
#
risk & compliance
#
encompass
Specialist in compliance technology, Encompass Corporation, earns 'One to Watch' status from Chartis Research's FCC50 list, highlighting performance in battling financial crime.
NormCyber unveils service to enhance cyber incident readiness
Tue, 19th Mar 2024
#
cx
#
martech
#
advanced persistent threat protection
NormCyber, a Fareham-based risk management firm, rolls out an Incident Response Readiness Assessment service to combat a 64% rise in cyber incidents by simulating attacks and fine-tuning their response.
Red Canary report unveils 2023's top cybersecurity threats
Tue, 19th Mar 2024
#
datacentre infrastructure
#
cybersecurity
#
healthtech
Red Canary's 6th annual Threat Detection Report reveals a substantial rise in Cloud Accounts compromises and abuses of Email Forwarding Rules, among major cybersecurity threats in 2023.
Panzura commended in DCIG report for robust data protection
Tue, 19th Mar 2024
#
storage
#
data protection
#
dr
Panzura gains recognition in the 2024-25 Data Center Intelligence Group report for its solid data protection in complex environments via its CloudFS global file management system.
CrowdStrike & NVIDIA team up for AI-powered cybersecurity
Tue, 19th Mar 2024
#
ai security
#
ai
#
cybersecurity
CrowdStrike and NVIDIA are collaborating to bolster AI-powered security on CrowdStrike's Falcon XDR platform. The alliance will harness NVIDIA’s GPU-optimised AI to enhance threat detection and defence, aiding in faster breach prevention.
New study exposes flaw-riddled corporate web applications
Tue, 19th Mar 2024
#
uc
#
cryptocurrency
#
blockchain
Kaspersky study unveils that between 2021-2023, access control and data protection flaws were found in numerous corporate web applications.
Zscaler boosts AI capabilities with cybersecurity startup Avalor acquisition
Tue, 19th Mar 2024
#
data analytics
#
cloud security
#
llms
Zscaler bolsters AI data prowess with the acquisition of cybersecurity startup Avalor, to enhance proactive identification of potential data breaches.