As artificial intelligence (AI) continues to revolutionize the business landscape, midsized organizations find themselves at a crossroads, balancing the transformative potential of AI against the heightened risks it introduces. While… The post Cyber Risks Associated with Adoption of Generative AI…
Category: Cyber Defense Magazine
Publisher’s Spotlight: Veriti
By Gary S. Miliefsky, Publisher, Cyber Defense Magazine Transforming Exposure Management with Safe, Automated Remediation Organizations today invest heavily in security tools, often spending $100k or more annually. But the… The post Publisher’s Spotlight: Veriti appeared first on Cyber Defense…
BREAKING: CISA Steps In to Keep CVE Services Alive
By Gary Miliefsky, Publisher, Cyber Defense Magazine Good news comes to us like a Windows patch Tuesday: Common Vulnerabilities and Exposures Program will continue operating with an eleven month continuation… The post BREAKING: CISA Steps In to Keep CVE Services…
Hyver by CYE: Transformative Cyber Exposure Management for Modern Enterprises
Rating: 10 out of 10 Introduction Today’s enterprise security teams face an overwhelming problem: they are inundated with thousands of vulnerabilities, alerts, and findings from dozens of tools, yet still… The post Hyver by CYE: Transformative Cyber Exposure Management for…
The Looming Shadow Over AI: Securing the Future of Large Language Models
These days Large Language Models (LLMs) are nothing short of revolutionary, though they have been around since 1996 (ELIZA, developed by Joseph Weizenbaum, simulating a psychotherapist in conversation). It always… The post The Looming Shadow Over AI: Securing the Future…
Understanding the 2025 HIPAA Security Rule Updates: A Comprehensive Analysis of Healthcare Cybersecurity Enhancements
Introduction The evolving landscape of healthcare cybersecurity is undergoing a major transformation with the Department of Health and Human Services’ (HHS) December 27, 2024, proposal to update the HIPAA Security… The post Understanding the 2025 HIPAA Security Rule Updates: A…
MITRE CVE Program in Jeopardy
As a former advisory board member to the CVE/OVAL initiatives, I’m sounding the alarm: MITRE has confirmed that funding for the CVE and CWE programs will expire on April 16,… The post MITRE CVE Program in Jeopardy appeared first on…
Publisher’s Spotlight: Industrial Defender
By Gary S. Miliefsky, Publisher, Cyber Defense Magazine In today’s hyperconnected world, protecting critical infrastructure has become a national imperative. From energy grids and transportation systems to water treatment facilities… The post Publisher’s Spotlight: Industrial Defender appeared first on Cyber…
Why Securing Prompts Will Never Be Enough: The GitHub Copilot Case
We’ve spent months analyzing how AI-powered coding assistants like GitHub Copilot handle security risks. The results? Disturbing. The Hidden Risks of AI Code Assistants GitHub Copilot is marketed as a… The post Why Securing Prompts Will Never Be Enough: The…
Unified Endpoint Management: One Tool to Rule All
As the number of endpoint devices increases, managing and securing them becomes complex. The traditional way of using separate security tools for desktops, mobile devices, tablets, and other endpoints is… The post Unified Endpoint Management: One Tool to Rule All…