There are several security risks associated with generative AI, including AI-powered social engineering attacks and evasion of traditional security defenses.
The potential of generative AI goes far beyond image generation and blog writing—it is a game-changer for staying ahead of evolving cybersecurity threats.
Process mining has several potential cybersecurity applications including incident investigation, anomaly detection, and detecting insider threats.
As cybersecurity teams face escalating demands and the need for faster responses, generative AI tcan help by scanning and summarizing vast amounts of data.
An Endor Labs study sheds light on ways to use ChatGPT in defensive cybersecurity. The company tapped AI to detect malware.
The increasing adoption of cloud services, particularly software-as-a-service (SaaS), has reshaped the role of the chief information security officer (CISO).
Discover why closing the loop by fixing code is essential to effectively combat the security risk of hard-coded secrets.
New research from Lookout identifies key pain points impacting the cybersecurity readiness of financial services firms, and recommends new approaches.
Chainguard’s container image registry powered by Cloudflare R2 aims to mitigate the escalating cost of downloading container images.
A proactive approach to SaaS security — starting with asset management — can protect against data misuse and other potential vulnerabilities.
In a survey covering hundreds of IT and cybersecurity leaders, Lookout pinpoints areas of complexity and cybersecurity challenges facing financial services firms.
Fortinet’s “Cyber Threat Predictions for 2023” report examines the rise of ransomware, the mainstreaming of edge attacks, and the weaponization of AI.
With its EU Sovereign Cloud, Oracle aims to address common risks associated with data residency, privacy, and management.
Manual code reviews have limitations in addressing the risks of hard-coded secrets, leading to a critical need for automated analysis in securing the software development process.
The Cybercrime Atlas is a collaborative effort involving businesses, law enforcement agencies, and researchers to combat cybercrime and strengthen global defenses against cyber threats.
Trend Micro predicts that cloud security will be absorbed into overall security operations, following a familiar trend with past innovations.
Get a preview of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on vendor selection criteria for multi-cloud and SaaS cybersecurity.
Get a preview of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on mitigating multi-cloud and SaaS cybersecurity risk while enabling the business.
Secrets sprawl is a pervasive problem in software security. Acceleration Economy analyst Rob Wood explains how to use automation to prevent exposed secrets in your applications.
Employment identity theft is a growing concern for individuals and businesses. Learn how to protect yourself and your organization from becoming a victim.



















