Category: Security
-
CyberArk and DSCI Release Report, “Orchestrating Multi-Cloud Identities – A Unified Approach to Access Management”
CyberArk released a report developed with the Data Security Council of India (DSCI), an industry body on data protection in India. The report titled “Orchestrating Multi-Cloud Identities – A Unified Approach to Access Management” was launched during CyberArk’s annual flagship event in Mumbai, the Impact World Tour 2024. The objective of this report is to highlight…
//
-
Tenable Research Discovers SMB Force-Authentication Vulnerability in Widely Used Open-Source Software
Tenable has disclosed that its Tenable Cloud Security Research team has discovered a medium-severity Server Message Block (SMB) force-authentication vulnerability that exists in all versions of Open Policy Agent (OPA) for Windows prior to v0.68.0. OPA is one of the most widely used policy engines built on open-source software. The vulnerability, tracked as CVE-2024-8260, exists…
//
-
Tenable Launches Data and AI Security Posture Management for Cloud
Tenable announced new data security posture management (DSPM) and artificial intelligence security posture management (AI-SPM) capabilities for Tenable Cloud Security, the actionable cloud security solution. Tenable Cloud Security reduces risk to two of the biggest emerging threats by extending exposure management capabilities to cloud data and AI resources. Today’s cloud environments are more complex than…
//
-
Star Health Faces $68K Ransom Demand After Major Data Breach Exposes Customer Information
India’s Star Health and Allied Insurance recently disclosed that it was targeted by a ransomware attack, resulting in a significant data breach. Following the attack, the company revealed that it had received a ransom demand of $68,000 from the hackers responsible for the leak. The breached data is believed to include sensitive customer information, raising…
//
-
Quantum Computing: The Next Frontier for Cybersecurity Threats
With the rapid evolution of quantum computing, a new threat looms over the cybersecurity landscape. The concept of “harvest now, decrypt later” is becoming a reality for hackers who are collecting encrypted data today in anticipation of decrypting it using future quantum computers. This article delves into why this tactic poses a significant risk and…
//
-
Safeguarding AI: Addressing the Surge in Adversarial Attacks
Artificial Intelligence (AI) is revolutionizing various industries, but it’s also becoming a prime target for adversarial attacks. These attacks, where malicious actors manipulate AI models by feeding deceptive inputs, are increasing in frequency and sophistication. Safeguarding AI has become a challenge for organizations, particularly from adversarial attacks. The threats are evolving rapidly from subtle image…
//
-
HID Signo Readers Line to further meet physical access control needs
HID announces the expansion of its signature line of Signo Readers to include models that meet varying customer needs – from harsh conditions and stylistic preferences to streamlined, economical requirements. As per the company release, the latest Signo models include: “Signo Readers are designed with versatility in mind to satisfy the increasing demand for customisation,”says…
//
-
Tenable Introduces AI Aware: A Proactive Security Solution for AI and LLMs
Tenable announced the release of AI Aware, an advanced detection capability designed to rapidly surface artificial intelligence solutions, and the vulnerabilities and weaknesses available in Tenable Vulnerability Management. Tenable AI Aware provides exposure insight into AI applications, libraries and plugins so organizations can confidently expose and close AI risk, without inhibiting business operations. The rapid…
//
-
Elastic expedites SecOps tasks with LangChain
Elastic in collaboration with LangChain, the de facto generative AI orchestration library, is building and delivering AI capabilities that expedite labor-intensive SecOps tasks. The collaboration has been core to the development of Elastic Security features—Automatic Import, Attack Discovery and Elastic Assistant for Security—on the Elastic Search AI Platform. These features streamline user migration to AI-driven…
//
-
Tenable Enhances Nessus Risk Prioritization
Tenable announced new risk prioritization and compliance features for Tenable Nessus, a vulnerability assessment solution. Nessus supports new and updated vulnerability scoring systems – Exploit Prediction Scoring System (EPSS) and Common Vulnerability Scoring System (CVSS) v4 – to help customers implement more effective prioritization for risk reduction and maintain compliance. Due to evolving threats and expanding…
//
Search
Categories
- Agriculture (7)
- Artificial Intelligence (90)
- Business (5)
- Cloud (38)
- CSR & Sustainability (36)
- Education (20)
- Fashion (23)
- Finance (19)
- Food (9)
- Health (29)
- Human Capital (4)
- Lifestyle (68)
- Literature & Books (19)
- Marketing (26)
- Mobility (10)
- Privacy (3)
- Real Estate (4)
- Science and Innovation (1)
- Security (50)
- Space Tech (1)
- Sports (13)
- Startup (18)
- Tech (164)
- Tourism (2)
- Travel (8)
Recent Posts
Tags
AI Artificial Intelligence Call Center ChatGPT Climate Change cloud CRM Cybersecurity digital marketing Education ERP Fashion FinTech Funding GenAI Generative AI Gigapixels Google Health IAS Coaching Learning Nvidia Privacy Quantum Computing Security Social Media Startups Sustainability Telecom Wildlife