Generative Data Intelligence

Tag: Security Operations

CISO Corner: Breaking Staff Burnout, GPT-4 Exploits, Rebalancing NIST

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

Top News

The Race for AI-Powered Security Platforms Heats Up

When a major vulnerability shakes up the cybersecurity world — such as the recent XZ backdoor or the Log4j2 flaws of 2021 — the...

Critical Infrastructure Security: Observations From the Front Lines

COMMENTARYRecent headlines around Volt Typhoon, a state-sponsored Chinese threat actor targeting US critical infrastructure, have caused alarm over attacker dwell time and put critical infrastructure security in...

Wiz Acquires Gem Security to Expand Cloud Detection and Response Offering

PRESS RELEASENEW YORK, April 10, 2024 – Cloud security leader Wiz has announced the acquisition of New York-based startup Gem Security. With a valuation of $10 billion...

CISO Corner: Ivanti’s Mea Culpa; World Cup Hack; CISOs & Cyber-Awareness

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

Reconsider Your CNAPP Strategy Using These 5 Scenarios

Multicloud security is an enormously complex undertaking, requiring security teams to correlate thousands of daily security alerts across disparate platforms to efficiently and accurately...

Cyber Threats Intensify in Middle East During Ramadan

The holy month of Ramadan is a period where Middle East-based companies step up cybersecurity with extra vigilance and outsourced support amid shortened working...

CISO Corner: Cyber-Pro Swindle; New Faces of Risk; Cyber Boosts Valuation

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we offer articles...

Celebrating Trailblazing Leaders in Cybersecurity

Johannesburg, South Africa, Mar 11, 2024 - (ACN Newswire) - The Cyber Security Summit, which will be held on 14 March 2024 at Johannesburg,...

CISO Corner: NSA Guidelines; a Utility SBOM Case Study; Lava Lamps

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Each week, we'll offer articles...

Navigating Biometric Data Security Risks in the Digital Age

COMMENTARYAlthough it wasn't called biometrics at the time, a rudimentary form of the technology emerged in 1901 when Scotland Yard adopted fingerprint classification to...

CISO Corner: Operationalizing NIST CSF 2.0; AI Models Run Amok

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

Blue Team: 6 open source tools to defend your position

Do you ever play computer games such as Halo or Gears of War? If so, you’ve definitely noticed a game mode called Capture the...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?