New guidance for organizations seeking to protect the generative AI tools they're running has been released by the OWASP Top ...
National insurance firm Crum and Forster is offering a professional liability program for CISOs who are facing growing ...
Discover the 5 best vendor risk management solutions, designed to help you mitigate third-party risks while ensuring ...
It’s been a little over a year since we first introduced security levels into Spectra Assure™ with the goal of reducing the ...
Augmented reality use cases have become prevalent in our society. The technology, which first emerged primarily in the world ...
I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to ...
The folks over at Packt Publishing sent me a gift recently. It was a copy of one of their latest books, Pentesting APIs: A practical guide to discovering, fingerprinting, and exploiting APIs. Oh, how ...
Flare recently hosted our first Threat Intel Workshop with Senior Threat Intelligence Researcher Tammy Harper. Below are some of the questions Tammy covered in improving threat intelligence collection ...
As software supply chain risks rise, regulatory authorities are increasingly requiring organizations to adopt software bills ...
Deployment of 5G and AI-enhanced IoT systems is accelerating. This, in turn, is driving up the number of IoT-connected ...
API attacks can be costly. Really costly. Obvious financial impacts like legal fines, stolen finances, and incident response budgets can run into the hundreds of millions. However, other hidden costs ...
Your internet account passwords are probably among the most guarded pieces of information you retain in your brain. With ...