The modern technology landscape is becoming increasingly advanced, and many enterprises are still trying to catch up. With the growing prominence of generative AI, organizational data is faced with new risks. Here, we talk with Steve Tait, Chief Technology Officer at Skyhigh Security, regarding the key areas of risk that generative AI can create. Security ..
Categoria : Security
According to a recent ISACA report, 63% of privacy professionals say their role is more stressful now than it was five years ago. Thirty-four percent say that it is significantly more stressful. They cite the main causes of this stress as the rapid evolution of technology (63%), compliance challenges (61%) and resource shortages (59%). When ..
Research from Sekoia has unveiled a phishing-as-a-service (PhaaS) kit sold by “Sneaky Log”, a cybercrime service operating via a bot on Telegram. These phishing pages have been in circulation since October 2024 at least, and they have targeted Microsoft 365 accounts. Below, security experts discuss the techniques observed in this kit and provide advice for defending ..
Gen 21, 2025 Marina Londei Gestione dati, In evidenza, News, RSS 0 La Commissione Europea ha dato il via libera a SECURE, un progetto che mira a migliorare la resilienza cibernetica e l’innovazione di cybersecurity delle PMI europee, per aiutarle a essere conformi al Cyber Resilience Act (CRA). Il progetto è coordinato dall’Agenzia per la ..
The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with the National Security Agency (NSA), the Defense Advanced Research Projects Agency (DARPA), and the Office of the Under Secretary of Defense for Research and Engineering (OUSD R&E), has released a report on the state of software understanding. This report, titled Closing the Software Understanding Gap, ..
Il settore sanitario è tra i più vulnerabili agli attacchi informatici, con un impatto potenzialmente devastante sulla disponibilità e la sicurezza dei servizi essenziali. Dal gennaio 2022, in Italia si sono verificati in media due eventi cibernetici malevoli al mese contro le strutture sanitarie, e la metà di questi si sono tradotti in incidenti di ..
Every morning, I start my day by reading the news, and every morning, I see headlines about major cyberattacks and breaches causing damage to companies, brands, and people around the world. The barrage of attacks and the damage that goes with them are relentless. Attackers will always be on the lookout for soft targets, but ..
Gen 20, 2025 Marina Londei In evidenza, News, Prodotto, RSS 0 SentinelOne ha annunciato che Purple AI, la soluzione di sicurezza della compagnia basata su intelligenza artificiale, supporta ora le piattaforme di security Zero Trust Exchange di Zscaler, i firewall di Palo Alto Networks, la soluzione di Okta, TAP di Proofpoint, FortiGate di Fortinet e ..
The United States Federal Trade Commission (FTC) charged GoDaddy with violations of the Federal Trade Commission Act for allegedly maintaining “unreasonable” security practices that led to multiple security breaches. The FTC’s proposed settlement order will require GoDaddy to take reasonable steps to tighten security and engage third-party security assessments. FTC Charged GoDaddy With Security Failures ..
Questo articolo è il primo di una serie estratta dal white paper “Big e Fast Data: tra sfida per la sicurezza e privacy”. In questa prima parte esploreremo in dettaglio i Big Data, le loro caratteristiche fondamentali e le implicazioni per il business moderno. Cosa Sono i Big Data: Definizione e Caratteristiche Principali “La definizione ..