AI Index Report episode 6: Zscaler develops new tools for IT and security teams; Protect AI secures funding for AI security tools; and Inworld builds a platform to create AI non-player characters, or NPCs.
security
AWS unveils a game-changing Cyber Insurance Program to address common challenges in the cyber insurance market, offering quick quotes, multiple insurer options, and use of AWS services for streamlined assessments.
New Lookout service solves an important problem for companies with employees in mainland China, enabling secure, high performance access to data and applications.
Discover why closing the loop by fixing code is essential to effectively combat the security risk of hard-coded secrets.
Gen AI raises privacy, confidentiality, and security concerns. The C-suite needs a plan for addressing these issues, and edge computing can play a vital role.
The Cybercrime Atlas is a collaborative effort involving businesses, law enforcement agencies, and researchers to combat cybercrime and strengthen global defenses against cyber threats.
Secrets sprawl is a pervasive problem in software security. Acceleration Economy analyst Rob Wood explains how to use automation to prevent exposed secrets in your applications.
Snyk provides developer-focused security for companies across every sector, enabling ongoing security improvements including reduced risk exposure.
The cybersecurity innovator Snyk caters to developers, ensuring that their code is secure as it’s written, and that their open-source software is monitored continuously.
This guidebook will help you see how generative AI can benefit your business while avoiding the pitfalls that come with adoption, all backed by practitioner guidance.
The human factor plays a critical role in endpoint security, and to minimize the risks of insider threats and human error, organizations should focus on educating employees and fostering a culture of security.
Endpoint security tools like Palo Alto Networks’ Cortex protect organizations from cyber threats and are especially necessary in the era of remote work.
Security leaders should have conversations with key personnel in HR, finance, and sales/marketing to ensure alignment between security and business goals.
These two complementary cybersecurity practices, when combined, enable organizations to quickly and effectively identify and mitigate potential cyber threats.
Janet Schijns discusses the power of strategic partnerships to navigate challenges, unlock opportunities, and achieve sustainable growth in the digital economy.
A briefing featuring three CISO Practitioner Analysts discussing the state of the market, CISO priorities, Multi-Cloud Cybersecurity, SaaS Security, and the impact of Generative AI.
In a survey of 1,600 business and tech leaders, Rubrik finds high levels of concern about cybersecurity preparedness, and reveals the extent of ransomware demands.
Fortinet has become a member in the Joint Cyber Defense Collaborative, contributing its threat intelligence research to strengthen U.S. cyber resilience.
Cloudera details its SDX design philosophy which embeds security and governance in every product and platform by default.
Tactical threat intelligence is gathering, analyzing, and sharing data to find cyber threats and figure out how to deal with them. Learn how to set up a program.