article thumbnail

Top 5 Security Trends for CIOs

CIO

Cybersecurity cannot stand still, or the waves of innovation will overrun the shores. Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins. A second, more pernicious risk is the fact that ChatGPT can write malware.

Trends 317
article thumbnail

Tenable Bolsters Its Cloud Security Arsenal with Malware Detection

Tenable

Tenable Cloud Security is enhancing its capabilities with malware detection. Combined with its cutting-edge, agentless vulnerability-scanning technology, including its ability to detect anomalous behavior, this new capability makes Tenable Cloud Security a much more complete and effective solution. Read on to find out how.

Malware 57
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Cybersecurity Technologies You Should Know

The Crazy Programmer

Cybersecurity is more critical than ever in today’s modern world, especially with news of ransomware attacks and other forms of malware on the rise. To keep your systems secure and your files out of the hands of cybercriminals takes an increasingly comprehensive knowledge of cybersecurity technology. Zero Trust.

article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. Our interconnected online world is no longer separate from our lives, businesses, or our global economy.

article thumbnail

Cybersecurity Snapshot: CISA Calls on Software Makers To Use Memory Safe Languages, as OpenSSF Issues Secure Software Principles

Tenable

Meanwhile, the OpenSSF published 10 key principles for secure software development. Plus, malware used in fake browser-update attacks ballooned in Q3. Cybersecurity and Infrastructure Security Agency (CISA) issued a clarion call for software makers to use so-called “memory safe” programming languages.

article thumbnail

Cybersecurity firm Fortanix secures capital to provide confidential computing services

TechCrunch

Companies (and VCs ) spend billions of dollars on cybersecurity, but primarily focus on protecting infrastructure or endpoints. That’s not always the right approach in a world where — thanks to the pandemic — data is increasingly distributed across clouds, software-as-a-service apps, and storage systems.

Hardware 169
article thumbnail

Software supply chain security is broader than SolarWinds and Log4J

TechCrunch

Previously he was staff software engineer and lead for Google’s Open Source Security Team (GOSST). SolarWinds and Log4j have made software supply chain security issues a topic of intense interest and scrutiny for businesses and governments alike. Dan Lorenc is CEO and co-founder of Chainguard. Unauthorized commits.

Software 225