article thumbnail

Cybersecurity Snapshot: A Look Back at Key 2023 Cyber Data for GenAI, Cloud Security, Vulnerability Management, OT, Cyber Regulations and more

Tenable

As we bid adieu to 2023, we highlight major trends that impacted cybersecurity professionals in the past 12 months. Learn how the cyber world changed in areas including artificial intelligence, CNAPP, IAM security, government oversight and OT security. Cybersecurity teams were no exception.

article thumbnail

New White Paper, “The Public Sector Improves Security and Efficiency with Hadoop”, Available in Research Library

CTOvision

A white paper has been added to the CTOVision Research Library which showcases several use cases for improving security and efficiency for government agencies using Hadoop. You can download this white paper by clicking here. By Charles Hall. Interested in using Hadoop in the federal space? IT Efficiency.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

White Paper: Automating Your Cyber Defenses Including Malware Removal

CTOvision

With changes in technology, enterprise cyber security professionals can now leverage automated in-line response and recovery to enhance security. Architecture Cyber Security DoD and IC Mobile Papers Automation Chief technology officer Computer security'

Malware 109
article thumbnail

CTOlabs publishes White Paper on Empowering Analysts With Big Data

CTOvision

By Bob Gourley CTOlabs.com, a subsidiary of the technology research, consulting and services firm Crucial Point LLC and a peer site of CTOvision.com , has just announced a white paper titled “ Empowering Analysts with Big Data.” Analysis Analytical Tools Big Data Cloud Computing CTO Cyber Security DoD and IC Gov2.0

article thumbnail

Cybersecurity Snapshot: As OpenAI Honcho Hits Capitol Hill, Regulatory Storm Clouds Form Over AI La La Land

Tenable

1 – Mr. Altman goes to Washington Lively discussions around how much government control there should be over artificial intelligence (AI) products continue globally – and cybersecurity teams should closely monitor which way the regulatory winds are blowing. Senate Judiciary Committee’s Subcommittee on Privacy, Technology and the Law.

article thumbnail

Exposure Management: Our Vision for Securing the Modern Attack Surface

Tenable

Securing today’s complex and dynamic IT environments requires bringing together vulnerability management, Web application security, cloud security, identity security, attack path analysis and external attack surface management to help you understand the full breadth and depth of your exposures. The result?

article thumbnail

ANNOUNCEMENT — Stackery Expands Serverless Security and Continuous Delivery Capabilities

Stackery

Today, Stackery is announcing enhanced security and continuous integration and delivery (CI/CD) capabilities that enable teams to automate delivery best practices from laptop to production. The Speed of Serverless with Enterprise Security and Governance. However, the remaining 60% reported security as a barrier to adoption.