Seeing the Unseen: How Generative AI Elevates Situational Awareness in Cybersecurity

Situational awareness in cybersecurity is hard! And poor situational awareness can be disastrous in cybersecurity. For a CISO, it could mean missing acting on a critical gap in the security program, leading ...

A Cybersecurity AI Assistant: The Pricey Addition You Don’t Need—Or Do You?

You’ve probably seen all the buzz lately—announcements about cybersecurity AI assistants promising to revolutionize the way companies defend against threats. With so much noise in the industry, it’s tough to know whether ...

9 Powerful Ways AI Can Enhance Cyber Risk Management Today

TL;DR: The recent Ponemon report, sponsored by Balbix, shows that organizations recognize that Artificial intelligence (AI) offers significant potential to address the cybersecurity skills gap through the automation of operational tasks, enabling ...

Ponemon Report: The Top Three AI Cyber Risks Revealed

The 2024 State of Enterprise Cyber Risk in the Age of AI report, independently conducted by Ponemon Institute and analyzed and published by Balbix, is fueled by over 20,000 answers from hundreds ...

Balbix Guide to XZ Utils Backdoor

Executive Summary On March 29, 2024, developer Andres Freund reported the discovery of a backdoor in XZ Utils, affecting v5.6.0 and 5.6.1. XZ Utils, which provides compression tools for the .xz format, ...

Caught in the SEC dilemma: what should CISOs put in their “honest” 10-K?

The new SEC cybersecurity disclosure date is here. US public companies must provide cybersecurity disclosures that comply with new SEC regulations in 10-Ks filings starting December 18, 2023. Smaller companies have another ...
It’s Time for a DRM “Do-over:” Findings and Takeaways in Kiteworks’ 2023 Sensitive Content Communications Report

It’s Time for a DRM “Do-over:” Findings and Takeaways in Kiteworks’ 2023 Sensitive Content Communications Report

Digitization Increases Risk Private and public organizations worldwide are becoming more dependent on digital communications, making the need for robust cybersecurity measures increasingly vital. Growth in digital communication coincides with a rise ...
AppTrana WAAP

What Is Cyber Security Audit and How Is It Helpful for Your Business?

The primary objective of a cybersecurity audit is to identify vulnerabilities, weaknesses, and potential threats in your IT infrastructure. The post What Is Cyber Security Audit and How Is It Helpful for ...
Data Regulation Data Breaches

Third-Party Breaches Grow More Destructive  

Today’s cybersecurity landscape is riskier, costlier and more complicated than ever before, with bad actors capitalizing on global disruption and vulnerability with destructive third-party breaches, allowing them to compromise multiple victims in ...
Security Boulevard

Cyber Insurance: Becoming Attractive to the Insurance Market

Don’t be fearful of risks. Understand them, and manage and minimize them to an acceptable level. – Navid Abdali Risks are a byproduct of an organization’s business strategy. Every decision carries some ...

Application Security Check Up