Link Trap: GenAI Prompt Injection Attack

Credit to Author: Jay Liao| Date: Tue, 10 Dec 2024 00:00:00 +0000

Prompt injection exploits vulnerabilities in generative AI to manipulate its behavior, even without extensive permissions. This attack can expose sensitive data, making awareness and preventive measures essential. Learn how it works and how to stay protected.

Read more

Cybersecurity Compass: Bridging the Communication Gap

Credit to Author: Juan Pablo Castro| Date: Thu, 26 Sep 2024 00:00:00 +0000

Discover how to use the Cybersecurity Compass to foster effective conversations about cybersecurity strategy between non-technical and technical audiences, focusing on the phases of before, during, and after a breach.

Read more

Confidence in GenAI: The Zero Trust Approach

Credit to Author: Sara Atie| Date: Thu, 22 Aug 2024 00:00:00 +0000

Enterprises have gone all-in on GenAI, but the more they depend on AI models, the more risks they face. Trend Vision One™ – Zero Trust Secure Access (ZTSA) – AI Service Access bridges the gap between access control and GenAI services to protect the user journey.

Read more

Cybersecurity Compass: An Integrated Cyber Defense Strategy

Credit to Author: Juan Pablo Castro| Date: Fri, 02 Aug 2024 00:00:00 +0000

Explore how the Cybersecurity Compass can guide various security professionals’ and stakeholders’ decision-making before, during, and after a breach.

Read more

AI Pulse: Brazil Gets Bold with Meta, Interpol’s Red Flag & more

Credit to Author: AI Team| Date: Tue, 30 Jul 2024 00:00:00 +0000

The second edition of AI Pulse is all about AI regulation: what’s coming, why it matters, and what might happen without it. We look at Brazil’s hard não to Meta, how communities are pushing back against AI training data use, Interpol’s warnings about AI deepfakes, and more.

Read more

How to Write a Generative AI Cybersecurity Policy

Credit to Author: Greg Young| Date: Mon, 29 Jul 2024 00:00:00 +0000

It’s clear that generative AI is a permanent addition to the enterprise IT toolbox. For CISOs, the pressure is on to roll out AI security policies and technologies that can mitigate very real and present risks.

Read more

QR Codes: Convenience or Cyberthreat?

Credit to Author: Sara Atie| Date: Tue, 23 Jul 2024 00:00:00 +0000

Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing)

Read more

Network detection & response: the SOC stress reliever

Credit to Author: Trend Micro Research| Date: Tue, 09 Jul 2024 00:00:00 +0000

Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important.

Read more

Why You Need Network Detection & Response Now

Credit to Author: Trend Micro Research| Date: Tue, 09 Jul 2024 00:00:00 +0000

Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important.

Read more

How Red Team Exercises Increases Your Cyber Health

Credit to Author: Johnny Krogsboll| Date: Thu, 11 Apr 2024 00:00:00 +0000

Delve into the world of red team exercises, their vital role in enhancing organizational security through simulated cyberattacks, including tactics like phishing and lateral movement within networks, and understand the need for regular testing and improvement to counter evolving threats effectively.

Read more