About Karl Greenberg

This author has not yet filled in any details.
So far Karl Greenberg has created 112 blog entries.

Check Point: Hackers Dropping Physical USB Drives at Watering Holes

Check Point's Global CISO discusses the firm's 2023 threat intelligence, including new AI malice and threat actors spreading malware by dropping flash drives.

By |2023-09-12T16:49:51+00:00September 12, 2023|Artificial Intelligence, check point software, ciso, cybersecurity, devops, hackers, Hardware, International, malware, Microsoft, penetration tests, Security, spam, spearphishing, Uncategorized|Comments Off on Check Point: Hackers Dropping Physical USB Drives at Watering Holes

Cisco: Booming identity market driven by leadership awareness

A new study by Cisco Investments with venture capital firms finds that most CISOs find complexity of tools, number of solutions and users, and even jargon a barrier to zero trust.

Patch ‘Em or Weep: Study Reveals Most Vulnerable IoT, Connected Assets

Phones, tablets and workstations with unpatched CVEs are a clear and present danger. New Armis study lists the most vulnerable.

By |2023-09-07T18:36:53+00:00September 7, 2023|devices, engineering, Internet of Things, iot, it, media player, mobile devices, OT, pc, ransomware, Security, Uncategorized, virtual machines, workstations|Comments Off on Patch ‘Em or Weep: Study Reveals Most Vulnerable IoT, Connected Assets

GitLab’s Lemos: AI, Automation are Key to DevSecOps

GitLab's CISO Josh Lemos on securing CI/CD of software with generative AI tools and how automation enables continuous security in the software development supply chain.

By |2023-08-29T22:45:31+00:00August 29, 2023|Artificial Intelligence, automation, ci/cd, Developer, devops, devsecops, generative ai, git, gitlab, log4j, Open source, Software, Uncategorized|Comments Off on GitLab’s Lemos: AI, Automation are Key to DevSecOps

Google Applies Generative AI Tools to Cloud Security

At the Google Next '23 conference, the company announced a slew of AI-powered cybersecurity solutions for the cloud, featuring Duet AI, Mandiant and Chronicle Security Operations.

By |2023-08-29T17:42:41+00:00August 29, 2023|Artificial Intelligence, Cloud, cloud security, cybersecurity, generative ai, Google, Google Chronicle, google cloud, Google Workspace, Mandiant, Security, Software, Uncategorized|Comments Off on Google Applies Generative AI Tools to Cloud Security

Abnormal Security: Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits

A new study found that 4.31% of phishing attacks mimicked Microsoft, far ahead of the second most-spoofed brand PayPal.

By |2023-08-29T16:07:06+00:00August 29, 2023|ai, Artificial Intelligence, BEC, chatgpt, check point, Cloud, cybersecurity, email, generative ai, International, it, IT Policies, Microsoft, Microsoft 365, network+, Networking, Open source, paypal, phishing, Security, social engineering, Software, Uncategorized|Comments Off on Abnormal Security: Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits

Google AI in Workspace Adds New Zero-Trust and Digital Sovereignty Controls

Google announced security enhancements to Google Workspace focused on enhancing threat defense controls with Google AI.

By |2023-08-24T18:05:18+00:00August 24, 2023|Artificial Intelligence, Big Data, Cloud, cloud security, cybersecurity, data provenance, data security, Gmail, Google, google cloud, google drive, Google Workspace, Innovation, International, Security, Uncategorized, zero trust|Comments Off on Google AI in Workspace Adds New Zero-Trust and Digital Sovereignty Controls
Go to Top