article thumbnail

Supply Chain Security: Shifting Left to the Golden Pipeline

Aqua Security

According to an article in Security Magazine , 98% of organizations have been negatively impacted by a cybersecurity breach in their supply chain. This report also discovered that almost every company they had evaluated had “vulnerabilities and misconfigurations that can expose them to supply chain attacks.”

article thumbnail

Cybersecurity Snapshot: ChatGPT Gets So-So Grade in Code Analysis Test, while JCDC Pledges To Focus on Protecting Critical Infrastructure

Tenable

Check out why ChatGPT’s code analysis skills left Carnegie Mellon researchers unimpressed. Meanwhile, CISA and OpenSSF shine a spotlight on the security of software package repositories. 1 - ChatGPT’s code analysis skills? Not great Thinking of using ChatGPT to detect flaws in your code? Review ChatGPT 3.5’s

ChatGPT 71
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: A ChatGPT Special Edition About What Matters Most to Cyber Pros

Tenable

1 - Don’t use ChatGPT for any critical cybersecurity work yet Despite exciting tests of ChatGPT for tasks such as finding coding errors and software vulnerabilities, the chatbot’s performance can be very hit-or-miss and its use as a cybersecurity assistant should be – at minimum – manually and carefully reviewed.

ChatGPT 129
article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response

Tenable

In addition, the latest on the Androxgh0st malware. 6 - CISA and FBI issue warning about Androxgh0st malware Is the Androxgh0st malware on your radar screen? Find out why Uncle Sam is warning critical infrastructure facilities about drones made in China, while urging water treatment plants to beef up incident response plans.

article thumbnail

Cybersecurity Snapshot: 6 Things That Matter Right Now

Tenable

Shifting security left – meaning, starting security checks earlier in the software development process – has been widely hailed. Most companies expect developers to do security code reviews, but many don’t provide them with security training. Challenges developers face concerning security during code reviews.

article thumbnail

Google: Monitor These Emerging Cloud Security Challenges in 2023

Tenable

Cloud providers’ IP addresses and open ports targeted with malware. After analyzing 2022 Q2 and Q3 data from its VirusTotal malware analysis service, Google found 6,000 malware samples actively communicating with Google Cloud Platform, Microsoft Azure and Amazon Web Services (AWS). Use hardened virtual machine images.

Cloud 52
article thumbnail

Cybersecurity Snapshot: CSA Offers Guidance on How To Use ChatGPT Securely in Your Org

Tenable

And, yes, more AI: How do you address software vulnerabilities in AI systems? federal agencies to which they sell software. federal agencies to which they sell software. federal agencies to which they sell software. 3 - Is AI vulnerability management on your radar screen?

ChatGPT 52