In this report, Chris Hughes identifies five products — from CloudStrike, NetRise, Palo Alto Networks, Wiz, and Zscaler — that equip CISOs to combat the latest threats.
Cisco is positioning itself for the future of cloud-native cybersecurity and AI through acquisitions of Splunk and Isovalent.
Snyk’s report on AI-generated code security shows how developers, lured by accelerated production, are unwittingly overlooking risks.
AnalystGPT taps into over 10,000 reports, articles, and videos by Acceleration Economy practitioner analysts to answer questions about AI, cloud, cybersecurity, and data.
The top 5 cybersecurity products to watch in 2024 feature a healthy dose of generative AI and turnkey platforms, as well as supply chain and cloud protections.
Discover the hidden risks embedded in AI code, including false security assumptions and a pattern of bypassing policies.
There is significant strategic value in looking at how cybersecurity threats are evolving and how that relates to strategic business plans.
For CISOs and security leaders, grappling with the global ramifications of the EU AI Act becomes paramount, necessitating a proactive stance.
Frank Domizio explores how IT leaders can ensure their organizations are protected from security threats in a way that also enables business growth.
A look at new guidelines for secure AI system development released by the Cybersecurity Infrastructure and Security Agency and the National Cybersecurity Center in the UK, emphasizing a holistic approach throughout the software development lifecycle.
Chris Hughes explains why sharing insights from threat intelligence with other senior execs can be a force multiplier in reducing organizational risk.
Wiz’s AI Security Posture Management (AI-SPM) addresses security and privacy concerns wrought by AI with comprehensive oversight, inventory management, and misconfiguration checks.
In this guidebook, practitioner analysts and CISOs define how to craft a secure foundation for businesses to thrive in today’s ever-changing digital economy.
Organizations must consider the security and privacy implications around using generative AI apps and large language models.
NetRise introduces Trace, an AI-powered feature revolutionizing software supply chain security, employing natural language processing to proactively identify and validate compromised assets and map relationships across the software supply chain.
Is AI genuinely a crucial component of a cybersecurity offering? CIO Kenny Mullican explores what existing practices look like with and without the technology.
NetRise’s AI-driven Trace feature transforms supply chain security, using semantic search and natural language processing to identify risks, offer context-rich insights, and create comprehensive asset graphs.
Establishing a strong working relationship between the CISO and the CIO is crucial for the overall success and security of a company, writes Kenny Mullican.
HYCU reaches SaaS data protection milestone with 50th integration, continues to ramp up protection for AWS environment.
The chief data officer (CDO) and chief information security officer (CISO) should agree on encryption, role-based access, zero trust security, and data retention for effective business decisions and risk mitigation.