Forrester analyst Sandy Carielli highlights key API security aspects in Forrester's report titled The Eight Components of API Security," which covers governance, discovery, testing, authentication and protection from API breaches as many organizations are grappling with the maturity of these areas.
In late Q4 2023, ISMG conducted a survey that attracted over 100 responses from professionals and provided a unique platform for Fraud, AML, Financial Crime, and Compliance leaders to contribute their insights and to offer a deeper understanding of how AI is shaping the daily battle against fraud.
As we bid farewell to 2023, Philip Reitinger, president and CEO of the Global Cyber Alliance, reflected on the state of global cyber hygiene, shedding light on what's working, what needs improvement, and the transformative shifts necessary to achieve a cyber-secure future.
Joe Kim, president and CEO of Sumo Logic, delved into the company's strategic shifts and future priorities after its acquisition by Francisco Partners this year. The company is now focusing on areas such as cloud-native scalability, technological advancements and a customer-centric approach.
Looking ahead to 2024, cybersecurity professionals and experts in artificial intelligence shared with ISMG their hopes for strong, responsible regulations and new partnerships with private sector stakeholders and international collaborators to keep pace with the evolving threat landscape.
In conjunction with a new report from CyberEd.io, Information Security Media Group asked some of the industry's leading cybersecurity and privacy experts about 10 top trends to watch in 2024. Ransomware, emerging AI technology and nation-state campaigns are among the top threats.
Use of the phrase "artificial intelligence" quadrupled over the past year, in line with the unprecedented pace of new users, thanks to the release of AI-run chatbots to the public. As the year comes to a close, Information Security Media Group looks back at the developments that shaped the industry.
Ukrainian cyber defenders report that fast-acting Russian military intelligence hackers have been targeting government agencies as well as organizations in Poland using backdoor malware tied to phishing lures based on a fake letter from the Ukrainian deputy prime minister.
A previously undiscovered critical exploit can allow threat actors to gain persistent, unauthorized access to Google services and connected accounts even after users have changed their passwords, cybersecurity researchers warn. They said the flaw enables hackers to manipulate the OAuth 2 protocol.
The New York Times is suing OpenAI and its chief backer Microsoft for copyright infringement, alleging that OpenAI used without permission "millions" of its copyrighted articles to train the large language models used by ChatGPT and by extension Bing Chat and Copilot.
Microsoft has deactivated a tool designed to simplify the installation of Windows applications after hacking groups began exploiting the functionality to distribute malware loaders, leading to infections involving backdoors and ransomware.
In this weekly update, four editors at Information Security Media Group delve into key 2023 cybersecurity issues, spotlighting efforts by the Biden administration, proposed U.S. healthcare cybersecurity laws, and crucial upcoming dates for the information security community.
Cybersecurity is a critical concern for organizations of all sizes these days, and the responsibility for promoting it often falls on the CISO. But there's often a major disconnect between the CISO and the rest of the C-suite. William Beer of Accenture discussed strategies for bridging the gap.
Quantum computers are in their infancy but rapidly advancing, so firms need to upgrade security protocols now to address threats that quantum technology could one day pose to current cryptographic methods, said Clement Jeanjean, business operations lead in the quantum security group at SandboxAQ.
Javvad Malik, lead security awareness advocate at KnowBe4, delves into the transition from cybersecurity awareness to a robust security culture. He underscored the importance of user-centric security, engaging security training and flexible security measures - in addition to MFA.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.