Picus Security today added an artificial intelligence (AI) capability to enable cybersecurity teams to automate tasks via a natural language interface. The capability, enabled by OpenAI, leverages the existing knowledge graph technologies from Picus Security. Dubbed Picus Numi AI, the…
Tag: Security Boulevard
Customer Story | Content Filter Protects Student Safety, Data Security, and CIPA Compliance At Azusa Unified School District
How Azusa’s technology team makes web filtering and online safety for students easy with Content Filter by ManagedMethods Like many school districts, state-of-the-art technology is at the forefront of Azusa Unified’s educational mission. As Director of Technology, Manuel Sanchez’s job…
Prioritizing Cyber Risk: Get a leg up with AI
In the previous blog post, we described how Balbix leverages AI to provide a unified and comprehensive visibility into your attack surface. Establishing it requires deduplicating, normalizing, and correlating data from dozens of tools, which becomes a foundational requirement for…
Guide to New CSRD Regulation for Data Center Operators
In the ever-evolving landscape of corporate sustainability, the European Union’s Corporate Sustainability Reporting Directive (CSRD) stands as a landmark regulation, redefining reporting obligations for businesses operating within or having a significant presence in the EU. Among those impacted are data…
How to Escape the 3 AM Page as a Kubernetes Site Reliability Engineer
It’s Saturday night. You’re out to dinner with friends. Suddenly, a familiar tune emits from your pocket. Dread fills you as you fish your phone out of your pocket and unlock it. You tap the alert. Maybe it’s a lucky…
A Deep Dive on the xz Compromise
xz is a widely distributed package that provides lossless compression for both users and developers, and is included by default in most, if not all, Linux distributions. Created in 2009, it has since released numerous versions. As an open-source project,…
Chrome’s Incognito Mode Isn’t as Private as You Think — but Google’s Not Sorry
Short term gain for long term pain? Class action attorney David Boies asked for $5,000 per user, but got nothing—except some assurances Google will delete data it no longer needs. The post Chrome’s Incognito Mode Isn’t as Private as You…
The Challenges of Zero Trust 800-207 and Advocating for Prescriptive Controls
In the rapidly evolving cybersecurity landscape, a Zero Trust (ZT) model has emerged as a beacon of hope, promising enhanced security posture and protection against sophisticated cyber threats. Documented in NIST Special Publication 800-207, Zero Trust Architecture (ZTA) advocates abandoning…
Chrome’s Incognito Mode: Not as Private as You Think — but Google’s not Sorry
Short term gain for long term pain? Class action attorney David Boies asked for $5,000 per user, but got nothing—except some assurances Google will delete data it no longer needs. The post Chrome’s Incognito Mode: Not as Private as You…
Sophos: Backups are in the Crosshairs of Ransomware Groups
When thinking about ransomware, enterprises that ignore their data backups do so at their own peril, according to cybersecurity firm Sophos. Protecting backups will significantly reduce the harm to a company hit by a ransomware attack and the need to…