ITNE: Security, AI, Google, Red Hat, CxO Security Events (313.3.6)
Volume 313, Issue 3:: Apr 15th, 2024 — Apr 21st, 2024
Security
Mandiant: Notorious Russian Hacking Unit Linked To Breach Of Texas Water Facility
51% Of Enterprises Experienced A Breach Despite Large Security Stacks
AI
Google News
Red Hat News
CxO Security Events
Compromised credentials in 2024: What to know about the world's #1 attack vector (Apr 23rd)
Protect Your Attack Vectors From Emerging Threats (Apr 25th)
How Are You Protecting Your Company from API Security Breaches? (May 1st)
Security
Mandiant: Notorious Russian Hacking Unit Linked To Breach Of Texas Water Facility
Researchers from the Google-owned firm conclude that Sandworm personas are linked to several recent attacks on critical infrastructure....more
What CIOs Can Learn From An Attempted Deepfake Call
An employee recognized something was wrong when they received an audio deepfake of the LastPass CEO....more
51% Of Enterprises Experienced A Breach Despite Large Security Stacks
Threat actors are continuing to successfully breach across the entire attack surface and the stakes are only getting higher: 93% of enterprises who admitted a breach reported unplanned downtime, data exposure, or financial loss as a result, according to Pentera....more
AI
Evaluate Whether Your Organization Needs A Chief AI Officer
As more businesses start developing comprehensive AI strategies, the new role of chief AI officer, or CAIO, might become the next addition to your organization's executive suite....more
How Artificial Intelligence Reshapes Every Industry
Artificial intelligence: Transforming every industry in unprecedented ways...more
How Chasing AI Shifts Tech Spending Patterns
In another big week we saw the AI battles continue to escalate....more
Google News
Cloud Ciso Perspectives: 20 Major Security Announcements From Next '24
Welcome to the first Cloud CISO Perspectives for April 2024. In this update, we'll give a list of some of the major announcements of security products and security enhancements to Google Cloud. There's an even longer list......more
Cloud Security Podcast
Join your hosts, Anton Chuvakin and Timothy Peacock, as they talk with industry experts about some of the most interesting areas of cloud security. If you like having threat models questioned and a few bad puns, please tune in!...more
Google Cloud Launches New Generative Ai, Cybersecurity, And Data Analytics Trainings With Employer Partner The U.S. Department Of The Treasury
To advance President Biden's Executive Order on Artificial Intelligence, the U.S. Department of the Treasury joins forces with Google Cloud to reimagine talent acquisition....more
Red Hat News
Connect Hybrid Cloud Kubernetes With F5 Multicloud Networking And Red Hat Openshift For Optimized Security Footprints
Many organizations face numerous challenges when modernizing their applications or migrating from on-premises applications to cloud-native microservices....more
Learn About Trends And Best Practices From Top Security Experts At Red Hat And Nist's Cybersecurity Open Forum
Red Hat and the National Institute of Standards and Technology (NIST) are pleased to announce our third annual Cybersecurity Open Forum - Improving the Nation's Cybersecurity....more
CxO Security Events
Compromised credentials in 2024: What to know about the world's #1 attack vector (Apr 23rd)
Join this webinar to learn more about compromised credentials and what you need to know to avoid the #1 attack vector....more
Protect Your Attack Vectors From Emerging Threats (Apr 25th)
Exposure can result in inbound threats, like DDoS attacks or zero day exploits, or users can encounter these threats while browsing the Internet. Join Lauren Guerra, Head of Threat Intelligence, and Catherine Newcomb, Product Marketing Manager for Application Security to discuss...more
How Are You Protecting Your Company from API Security Breaches? (May 1st)
A recent report on the State of API Security in 2024 found that 71% of all Internet traffic was API calls. Other studies have found similar numbers....more