Two experts from HackerOne - Marten Mickos, CEO, and Alex Rice, CTO and co-founder - provide insights on the similarities and differences between ethical hackers and in-house red teams, as well as the misconceptions around engaging with ethical hackers.
Organizations have long been using software from open-source ecosystems without fully realizing how much software they actually pull from these libraries, but the potential downstream effects of security flaws could have a major impact, said Pete Morgan, co-founder and CSO at Phylum.
A key challenge for intelligence analysts is not just finding the right data intelligence but determining how much to trust it and how to make it relevant to their organization. Flashpoint is aiding this by streamlining workflow, said Chief Product and Engineering Officer Patrick Gardner.
Developers want to move quickly and they want security to be "a natural part" in every step of the software development life cycle. Generative AI can play a pervasive role in helping cybersecurity keep up the pace, according to Brian Roche, chief product officer at Veracode.
Venture capitalist Alberto Yépez says there are opportunities to innovate in this economy. The market is self-correcting, but the demand for cyber protection has increased with the rise in cyberattacks and increased regulations, making it a top priority in terms of technology budgets, he said.
ISMG editors are live at RSA Conference 2023 in San Francisco with an overview of the latest speakers and hot topics, including the continuing conversation about generative AI and the decline and fall of blockchain. Join us for daily updates from San Francisco.
The United Kingdom should augment its cryptocurrency asset seizure abilities as part of an effort to combat ransomware and other cybercrime, a parliamentary panel heard. The rate of seizures is not commensurate with the level of crypto adoption, said Aidan Larkin, CEO of Asset Reality.
ChatGPT is "amazing" and "has reformed the way we interact with computing," says Nikesh Arora, chairman and CEO of Palo Alto Networks. But to get value from AI and to use it to make the SOC more proactive, we need to have a lot of data - and pay attention to what it's telling us, he says.
Testifying before Congress in 1991, Winn Schwartau coined the term "electronic Pearl Harbor." The chief visionary officer of The Security Awareness Company stands by his prediction, pointing to a mounting number of attacks. Now the world needs to worry about security and privacy in the metaverse.
ChatGPT may be grabbing headlines, but many security practitioners are still skeptical about AI. ISMG editors at the RSA Conference 2023 in San Francisco discuss the hot topics this year, from the looming risk of the metaverse and our reality to the latest approach to cloud development.
How do we manage the risk of global supply chain attacks? Will a shift in cybersecurity liability to software providers help improve the problems of software vulnerabilities? Adam Isles, principal of The Chertoff Group, said mandating software bill of materials measures has its own challenges.
ISMG editors are live at RSA Conference 2023 in San Francisco with an overview of opening-day speakers and hot topics including the emergence of AI, the latest intel on nation-state threats, security product innovation and deals, and ransomware trends. Join us for daily updates from RSA.
Application security and delivery vendor F5 will shrink its workforce by 9% due to customers delaying purchasing decisions amid macroeconomic uncertainty. The Seattle-based firm will lay off 623 of its 7,100 employees as part of a cost-cutting effort that includes reducing F5's facilities footprint.
Between April 14 and 20, hackers stole $23 million from Bitrue, $7 million from Hundred Finance and $10.5 million from 11 blockchains. The SafeMoon hacker returned 80% of the stolen $8.9 million, MetaMask suffered a third-party breach and Kyber Network advised LPs to withdraw funds from Elastic.
The potential use cases for generative AI technology in healthcare appear limitless, but they're weighted with an array of potential privacy, security and HIPAA regulatory issues, says privacy attorney Adam Greene of the law firm Davis Wright Tremaine.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.