Skip to main content

Recursos

White paper

5 Common AppSec Challenges in FinServ

Leia agora

Ebook

5 Critical Capabilities for Progressing Your DevSecOps Program

Leia agora

Ebook

Optimizing AppSec in the technology sector: Strategies & Challenges

Leia agora
Tipo
Tópico

Mostrando 1 - 12 de 297 recursos

Podcast

Authentication, Authorization, And The Future Of AI Security With Alex Salazar

Episódio 161

Article

7 Surprising Roadblocks on the Path to DevSecOps Maturity

Understand how your organization's DevSecOps maturity compares to industry benchmarks. Learn about common challenges in risk reduction, security fatigue, and developer adoption. Get the insights.

Article

Adversarial Inputs to Image Classifiers: Understanding the Threat of Adversarial AI

Explore the vulnerabilities of AI image classifiers to adversarial attacks. Understand techniques like C&W, PGDL2, DeepFool, their implications, and the importance of AI security.

Article

In Localhost We Trust: Exploring Vulnerabilities in Cortex.cpp, Jan’s AI Engine

Discover critical security vulnerabilities recently found in Cortex.cpp, the engine behind the local AI platform Jan AI, revealing that self-hosted AI isn't automatically secure. Learn how attackers could exploit these flaws and the importance of prioritizing security in the growing ecosystem of on-premise AI solutions.

Article

The Essential Guide to AI Bills of Materials (AIBOMs)

This guide is your one-stop shop on AI Bill of Materials (AIBOMs). Learn how to build an inventory of your AI model.

Article

AI Attacks & Threats: What are they and how do they work?

Discover more about AI cyber-attacks: what they are, how they work, and how to protect your business against them.

Article

How is AI being used in cybersecurity?

Learn how the emergence of AI is changing organizations' approaches to cybersecurity, leveraging different AI models to improve the efficiency of cybersecurity programs.

Article

Why open source governance is key for security

What is open source governance? Open source governance is the recognized rules and customs that guide an open source project.

Article

Cloud Compliance Standards: Frameworks & Controls

When choosing a cloud compliance tool, consider capabilities such as policy as code and historical reporting to help maintain and verify your compliance.

Article

Cloud Security Automation

Organizations working towards adopting cloud computing report that security and compliance are two of the top three barriers they face: 35% of cybersecurity professionals stated security is their biggest barrier, while 31% reported compliance (Statista).

Article

DevSecOps Program Success

Improving secure development is a journey that takes time, and starts with getting visibility into the existing security processes and practices that are done by each team today. If this isn’t done in an empathetic way, this process can be perceived as a reaction to development shortcomings. When others think there’s blame or judgment, it’s easy to get defensive responses.

Article

SOC 2 Cloud Compliance Guide

What is SOC 2 and why is it important for your organization? Follow our steps to bring your cloud environments into SOC 2 compliance.