There are several security risks associated with generative AI, including AI-powered social engineering attacks and evasion of traditional security defenses.
Search Results: CISO (332)
In a new analysis of the SaaS market, cybersecurity software provider Grip Security identifies nearly 75,000 apps and the resulting attack surface risks.
As cybersecurity teams face escalating demands and the need for faster responses, generative AI tcan help by scanning and summarizing vast amounts of data.
The increasing adoption of cloud services, particularly software-as-a-service (SaaS), has reshaped the role of the chief information security officer (CISO).
New research from Lookout identifies key pain points impacting the cybersecurity readiness of financial services firms, and recommends new approaches.
Fortinet’s “Cyber Threat Predictions for 2023” report examines the rise of ransomware, the mainstreaming of edge attacks, and the weaponization of AI.
Get a preview of part 3 of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on selecting vendors to support data modernization in the cloud.
Manual code reviews have limitations in addressing the risks of hard-coded secrets, leading to a critical need for automated analysis in securing the software development process.
Gen AI raises privacy, confidentiality, and security concerns. The C-suite needs a plan for addressing these issues, and edge computing can play a vital role.
Get a preview of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on how to evaluate vendors and partners when moving to modern Cloud ERP from the CXO perspective.
Trend Micro predicts that cloud security will be absorbed into overall security operations, following a familiar trend with past innovations.
Get a preview of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on vendor selection criteria for multi-cloud and SaaS cybersecurity.
Get a preview of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on mitigating multi-cloud and SaaS cybersecurity risk while enabling the business.
Secrets sprawl is a pervasive problem in software security. Acceleration Economy analyst Rob Wood explains how to use automation to prevent exposed secrets in your applications.
Employment identity theft is a growing concern for individuals and businesses. Learn how to protect yourself and your organization from becoming a victim.
Get a preview of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on evaluating AI platforms, partners, and vendors.
Get a preview of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on top obstacles and concerns about AI from the CXO perspective.
The cybersecurity innovator Snyk caters to developers, ensuring that their code is secure as it’s written, and that their open-source software is monitored continuously.
Get a preview of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on top obstacles and concerns when moving to modern Cloud ERP from the CXO perspective.
Get a preview of part 2 of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on obstacles to data modernization projects.