Cyber Security CISO Corner: What Cyber Labor Shortage?; Trouble Meeting SEC Disclosure Deadlines May 17, 2024 darkreading.com Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also…
Cyber Security CISOs Grapple With IBM's Unexpected Cybersecurity Software Exit May 17, 2024 darkreading.com IBM's abrupt divestiture of QRadar SaaS underscores the consolidation of SIEM, XDR, and AI technologies into unified platforms.
Cyber Security Palo Alto Networks and IBM to Jointly Provide AI-Powered Security Offerings May 15, 2024 darkreading.com PRESS RELEASE SANTA CLARA, Calif. and ARMONK, N.Y., May 15, 2024 /PRNewswire/ — Palo Alto Networks (NASDAQ: PANW), the global cybersecurity...
Cyber Security Reality Defender Wins RSAC Innovation Sandbox Competition May 10, 2024 darkreading.com In a field thick with cybersecurity startups showing off how they use AI and LLMs, Reality Defender stood out for…
Cyber Security Ascension Healthcare Suffers Major Cyberattack May 10, 2024 darkreading.com The attack cut off access to electronic healthcare records (EHRs) and ordering systems, plunging the organization and its health services…
Cyber Security Detect and Destroy Cyber Threats with Red Piranha May 7, 2024 cyberdefensemagazine.com By Adam Bennett, CEO, Red Piranha Red Piranha is Australia’s leading cybersecurity technology and solutions developer, manufacturer, and official member…
Cyber Security LLMs & Malicious Code Injections: ‘We Have to Assume It’s Coming’ May 6, 2024 darkreading.com Large language models promise to enhance secure software development life cycles, but there are unintended risks as well, CISO warns…
Cyber Security Strengthening Cyber Defense with Threat Intelligence Operations May 6, 2024 cyberdefensemagazine.com By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more…
Cyber Security CISO Corner: Verizon DBIR Lessons; Workplace Microaggression; Shadow APIs May 3, 2024 darkreading.com Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also…
Cyber Security Good Security Is About Iteration, Not Perfection. Apr 28, 2024 cyberdefensemagazine.com By Craig Burland, CISO, Inversion6 In the dynamic and unpredictable realm of cybersecurity, striving for perfect solutions can be a…
CISO Corner: What Cyber Labor Shortage?; Trouble Meeting SEC Disclosure Deadlines
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also…
CISOs Grapple With IBM's Unexpected Cybersecurity Software Exit
IBM's abrupt divestiture of QRadar SaaS underscores the consolidation of SIEM, XDR, and AI technologies into unified platforms.
Palo Alto Networks and IBM to Jointly Provide AI-Powered Security Offerings
PRESS RELEASE SANTA CLARA, Calif. and ARMONK, N.Y., May 15, 2024 /PRNewswire/ — Palo Alto Networks (NASDAQ: PANW), the global cybersecurity...
Reality Defender Wins RSAC Innovation Sandbox Competition
In a field thick with cybersecurity startups showing off how they use AI and LLMs, Reality Defender stood out for…
Ascension Healthcare Suffers Major Cyberattack
The attack cut off access to electronic healthcare records (EHRs) and ordering systems, plunging the organization and its health services…
Detect and Destroy Cyber Threats with Red Piranha
By Adam Bennett, CEO, Red Piranha Red Piranha is Australia’s leading cybersecurity technology and solutions developer, manufacturer, and official member…
LLMs & Malicious Code Injections: ‘We Have to Assume It’s Coming’
Large language models promise to enhance secure software development life cycles, but there are unintended risks as well, CISO warns…
Strengthening Cyber Defense with Threat Intelligence Operations
By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more…
CISO Corner: Verizon DBIR Lessons; Workplace Microaggression; Shadow APIs
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also…
Good Security Is About Iteration, Not Perfection.
By Craig Burland, CISO, Inversion6 In the dynamic and unpredictable realm of cybersecurity, striving for perfect solutions can be a…