The last twelve months have rocked almost every area of life, from the mundanities of keeping on top of grocery shopping or dentist appointments, to the ability entire, global industries have to continue functioning “ or, in the most extreme instances, even existing at all. AI has helped address some of the most pressing challenges that have arisen from the pandemic. A number … [Read more...] about Can AI Solve the Most Pressing Cybersecurity Challenges Arising from Covid-19?
cyber
Details on the New NIST Requirement for RASP and IAST
#1 Intro The new requirements from NIST Last fall, the US National Institute of Standards and Technology (NIST) updated its security and privacy framework, Security and Privacy Controls for Information Systems and Organizations (SP 800-53.2). In doing so, it has recognized the inefficiency of current application security methodology and the need for a paradigm shift if we were … [Read more...] about Details on the New NIST Requirement for RASP and IAST
The Impact Of AI On Cybersecurity
Artificial intelligence is a term that many science fiction fans are well aware of. However, in recent years, it has gone from fiction pages into reality, as more and more developers are leveraging software's ability to teach itself. New languages and techniques have sprouted up to help machines teach themselves the best way to do things. While this has made for faster … [Read more...] about The Impact Of AI On Cybersecurity
Parameters To Look At While Evaluating Mobile Application Security Solutions
Mobile applications have gained popularity fast - making it a real challenge for developers to keep up with demand and competition. This has led to app security not getting appropriate attention, which in turn has led to vulnerabilities creeping into most apps, even the ones deemed to be secure and impenetrable. Although the most apparent vulnerabilities are prioritized and … [Read more...] about Parameters To Look At While Evaluating Mobile Application Security Solutions
What is the Zero Trust Model (ZTM)
The Zero Trust Model of information security simplifies how information security is conceptualized by assuming there are no longer trusted interfaces, applications, traffic, networks, or users. It takes the old model ” trust but verify ”and inverts it, because recent breaches have proven that when an organization trusts, it doesn't verify [6]. This model requires that the … [Read more...] about What is the Zero Trust Model (ZTM)