Category: AI in news
Cybersecurity Snapshot: NIST Program Probes AI Cyber and Privacy Risks, as U.S. Gov’t Tackles Automotive IoT Threat from Russia, China
- by nlqip
A new NIST program will revise security frameworks like NIST’s CSF as AI risks intensify. Plus, the U.S. may ban cars with Russian and Chinese IoT components. Meanwhile, the CSA adds AI insights to its zero trust guide. And get the latest on cybersecurity budgets, SBOMs and the Ghost cybercrime platform! Dive into six things…
Read MoreAs we’ve developed Tenable’s cloud security program, we in the Infosec team have asked many questions and faced interesting challenges. Along the way, we’ve learned valuable lessons and incorporated key best practices. In this blog, we’ll discuss how we’ve approached implementing our cloud security program using Tenable Cloud Security, and share recommendations that you may…
Read More‘Carahsoft is fully cooperating on this matter,’ a spokesperson says. Carahsoft confirmed to CRN that representatives from the United States Department of Justice came to the solution provider giant’s office Tuesday as part of an investigation into a separate company. In an email, a spokesperson with the government-focused IT company–No. 16 on CRN’s 2024 Solution…
Read MoreWith nearly every MSSP and Security company claiming to do Managed Detection and Response (MDR) it’s more important than ever to choose the right MDR provider. Before you start evaluating potential partners, it’s crucial to step back and clearly define your organization’s security objectives. This not only helps in selecting the right provider but also…
Read MoreCybersecurity Snapshot: Critical Infrastructure Orgs Found Vulnerable to Basic Hacks, While New MITRE Tool Uses ML to Predict Attack Chains
- by nlqip
Report finds that many critical infrastructure networks can be breached using simple attacks. Plus, a new MITRE Engenuity tool uses machine learning to infer attack sequences. Meanwhile, CISA will lead a project to standardize civilian agencies’ cyber operations. And get the latest on XSS vulnerabilities, CIS Benchmarks and a China-backed botnet’s takedown! Dive into six…
Read MoreShining a Light in the Dark – How Binary Defense Uncovered an APT Lurking in Shadows of IT | Binary Defense
- by nlqip
Written by ARC Labs contributors, John Dwyer and Eric Gonzalez In cybersecurity, the threats we don’t see—or don’t expect—often pose the greatest danger. Recently, this became all too clear when three unmanaged AIX servers, sitting exposed on the internet, opened the door for a China-Nexus Threat Actor to launch an attack. What may seem like obscure, legacy…
Read More‘June [Yang’s] addition to our board will fuel Ahead’s ability to deliver game-changing hybrid cloud and AI services to our clients,’ says Ahead CEO Daniel Adamany. Solution provider all-star Ahead has appointed former VMware and Google Cloud top executive June Yang (pictured) to its board of directors in a move to accelerate Ahead’s AI services…
Read MoreAn Analyst’s Guide to Cloud-Native Vulnerability Management: Where to Start and How to Scale
- by nlqip
Cloud-native workloads introduce a unique set of challenges that complicate traditional approaches to vulnerability management. Learn how to address these challenges and scale cloud-native VM in your org. As enterprises continue their migration to cloud-native architectures, the need for advanced vulnerability management (VM) strategies tailored specifically for cloud has intensified. The complexities inherent in cloud-native…
Read MoreAs organizations modernize their infrastructure, containers offer unparalleled flexibility and scalability but they also introduce unique security challenges. In this blog we explain container security challenges, identify top threats and share how the newly released Tenable Enclave Security can keep your containers secure. Containers are changing enterprise IT and are now essential in modern app…
Read MoreOne of the most frequent questions we get from our clients considering our Dedicated Resources are, “How do your Dedicated Resources differ from traditional staff augmentation?” It’s a great question and one that highlights a crucial distinction in how we approach cybersecurity. We’re going break down those differences in the blog below, so you can…
Read MoreRecent Posts
- Arm To Seek Retrial In Qualcomm Case After Mixed Verdict
- Jury Sides With Qualcomm Over Arm In Case Related To Snapdragon X PC Chips
- Equinix Makes Dell AI Factory With Nvidia Available Through Partners
- AMD’s EPYC CPU Boss Seeks To Push Into SMB, Midmarket With Partners
- Fortinet Releases Security Updates for FortiManager | CISA