'

Vulnerabilities in Docker, other container engines enable host OS access

Vulnerabilities in Docker, other container engines enable host OS access

Security researchers have found four vulnerabilities in Docker components that could allow attackers to access host operating systems from within containers. One of those vulnerabilities is in runc, a command-line tool for spawning and running containers on Linux that underpins multiple container engines, not just Docker. The vulnerabilities were found by Rory McNamara, a researcher … Read more

Accelerate threat response and democratize SOC skill sets with generative AI

Accelerate threat response and democratize SOC skill sets with generative AI

How much more could your organization accomplish if you could automate common, repeatable tasks across security, compliance, identity, and management? Managing an organization’s defenses is a challenging and time-consuming task for many different reasons. Adopting and integrating new security technology takes time and resources to monitor and maintain alongside the company’s existing technology portfolio. Security … Read more

Scaling security with AI: from detection to solution

Dongge Liu and Oliver Chang, Google Open Source Security Team, Jan Nowakowski and Jan Keller, Machine Learning for Security Team The AI world moves fast, so we’ve been hard at work keeping security apace with recent advancements. One of our approaches, in alignment with Google’s Safer AI Framework (SAIF), is using AI itself to automate … Read more

AI Predictions for 2024: Moving forward with precise systems that combine power, security, intelligence, and ease of use.

AI Predictions for 2024: Moving forward with precise systems that combine power, security, intelligence, and ease of use.

Artificial intelligence (AI) has been table stakes in cybersecurity for several years now, but the broad adoption of Large Language Models (LLMs) made 2023 an especially exciting year. In fact, LLMs have already started transforming the entire landscape of cybersecurity. However, it is also generating unprecedented challenges. On one hand, LLMs make it easy to … Read more

Safeguarding the healthcare sector with dynamic cybersecurity

Safeguarding the healthcare sector with dynamic cybersecurity

Cyberattacks in the healthcare industry undermine our ability to deliver quality care and can endanger the safety, and even the lives, of our patients. Unfortunately, hackers see our industry as a prime target, particularly for ransomware and data privacy attacks. None of us want to hear the news that a hospital has been breached, nor … Read more

Executives Navigate Operational Technology Security Challenges

Executives Navigate Operational Technology Security Challenges

As threat actors continue to target manufacturing plants and utilities, boards of directors and executives are beginning to better understand the value of better securing the operational technology (OT) that underpins this critical infrastructure. The days where OT and IT environments were completely separate are long gone, but questions about securing traditional IT infrastructure have … Read more

Categories duo

What IT Leaders should appreciate about SOAR in 2024

What IT Leaders should appreciate about SOAR in 2024

Coined in 2015 and later updated in 2017 by Gartner, SOAR (security orchestration, automation, and response) describes a platform that is designed to orchestrate the response to incidents, leveraging automated processes designed in decision tree mapping, typically called playbooks. The value of a SOAR platform is focused on improving the accuracy, speed, and depth of … Read more

AI-Powered Attacks and Deepfake Technology Fuel Cyberattack Concern

AI-Powered Attacks and Deepfake Technology Fuel Cyberattack Concern

Today, password security pros, Keeper Security have released the key findings from its latest survey about the state of cybersecurity and the burgeoning threats that are keeping cyber professionals up at night. The survey of more than 800 IT security leaders around the globe finds that the vast majority (95%) believe cyberattacks are more sophisticated … Read more

Canada’s foreign affairs department investigates data breach

Canada’s foreign affairs department investigates data breach

Global Affairs Canada (GAC), the foreign affairs department of the Canadian government, said it is investigating a data breach in its internal network. “Early results [of the investigation] indicate there has been a data breach and that there has been unauthorized access to personal information of users, including employees. The department is contacting those affected … Read more

New Israeli startup to help organizations deal with GenAI-related risks

New Israeli startup to help organizations deal with GenAI-related risks

Israeli cybersecurity platform Aim Security has put together a SaaS offering tailored specifically against enterprise risks associated with the use of generative AI (GenAI) tools. The offering is aimed at providing collective visibility, detection, enforcement, and protection against GenAI risks spanning varied enterprise use cases: public GenAI, enterprise GenAI (like Microsoft Copilot), and homegrown GenAI. … Read more

Check Point’s new generative AI tool offers platform-wide intelligence and remediation

Check Point’s new generative AI tool offers platform-wide intelligence and remediation

Cybersecurity company Check Point Software Technologies has debuted a new platform-wide generative AI-based tool to improve the speed and effectiveness of security decision making across its Infinity group of solutions. Designed to handle both routine administrative tasks as well as those requiring an analytical assessment, Infinity AI Copilot is designed to help address the time … Read more

Introducing meaningful AI features for information security in 2024

Nick Graham, Chief Technology Officer at information security software business Hicomply discusses the recent surge in interest around artificial intelligence. He explains why his company is focused on developing AI tools that deliver benefits over media buzz. There’s been a distinct pattern to the way that tech trends manifest over the last 20 years or … Read more