Tenable Cyber Watch: OpenAI CEO Testifies Before Congress; Meet DarkBERT, New AI Trained on the Dark Web; and moreMay 29, 2023
This week’s edition of the Tenable Cyber Watch unpacks Sam Altman’s testimony before Congress on AI risks and regulations, and addresses the importance of cyberattack victims speaking up after an attack. Also covered: An introduction to DarkBERT, the only AI trained on the Dark Web.
Cybersecurity Snapshot: How Enterprise Cyber Leaders Can Tame the ChatGPT BeastMay 26, 2023
Check out a guide written for CISOs by CISOs on how to manage the risks of using generative AI in your organization. Plus, the White House unveils an updated national AI strategy. Also, a warning about a China-backed attacker targeting U.S. critical infrastructure. And much more!
Tenable Cyber Watch: Protecting Quantum Computers from Cyberattacks, AI Vulnerability Management, and moreMay 22, 2023
This week’s edition of the Tenable Cyber Watch unpacks how to protect quantum computers from cyberattacks and addresses the importance of AI vulnerability management. Also covered: CISA’s draft of its security attestation form for software vendors.
Cybersecurity Snapshot: As OpenAI Honcho Hits Capitol Hill, Regulatory Storm Clouds Form Over AI La La LandMay 19, 2023
Check out what OpenAI’s CEO told lawmakers in Congress about regulating AI. Meanwhile, an upcoming EU law could cramp ChatGPT’s style. Also, the public’s nail biting over AI is real. In addition, a new AI chatbot may soon answer your burning questions about the dark web. And much more!
Tenable Cyber Watch: White House Unveils $140M Investment for Responsible AI, Top 5 Malware in Q1 2023, and moreMay 15, 2023
This week’s edition of the Tenable Cyber Watch unpacks the White House’s $140 million dollar investment into AI research and development and explores the security implications of ChatGPT. Also covered: The top 5 malware strains for Q1 2023.
Cybersecurity Snapshot: How To Boost Customers' Trust in Your Digital ServicesMay 12, 2023
Check out how beefing up digital trust in your technology yields key business benefits. Plus, a sophisticated cyber espionage operation has been defused. Also, why cyberattack victims should speak up. In addition, don’t miss our poll on mobile device security. And much more!
Tenable Cyber Watch: Nearly 50% of Workers Have Accessed Ex-Employers’ Accounts, Biden Seeks Your Input on AI Accountability, and moreMay 8, 2023
This week’s edition of the Tenable Cyber Watch unpacks why organizations are looking to consolidate cyber vendors and addresses the White House’s efforts to make sure AI products are safe. Also covere...
Cybersecurity Snapshot: CSA Offers Guidance on How To Use ChatGPT Securely in Your OrgMay 5, 2023
Check out the Cloud Security Alliance’s white paper on ChatGPT for cyber pros. Plus, the White House’s latest efforts to promote responsible AI. Also, have you thought about vulnerability management for AI systems? In addition, the “godfather of AI” sounds the alarm on AI dangers. And much more!
Tenable Cyber Watch: 3 Hot Takes from RSA Conference, Samsung Employees Leak Sensitive Data to ChatGPT, and moreMay 1, 2023
This week’s edition of the Tenable Cyber Watch dishes out 3 hot takes from the RSA Conference and unpacks the Samsung employee data leak to ChatGPT. Also covered: What cyber professionals say is their biggest worry.
Cybersecurity Snapshot: RSA Conference Special Edition with All-You-Can-Eat AI and ChatGPTApril 28, 2023
Check out our roundup of what we found most interesting at RSA Conference 2023, where – to no one’s surprise – artificial intelligence captured the spotlight, as the cybersecurity industry grapples with a mixture of ChatGPT-induced fascination and worry. Oh generative AI, it hurts so good!
How to Improve Kubernetes Security: Four Best Practices to Implement TodayApril 25, 2023
How to ensure the right configurations and policies are in place to keep your cloud environments secure.
‘K’ is for ‘Komplex’: Key Kubernetes Considerations for Security TeamsApril 24, 2023
The use of Kubernetes introduces complexity to the modern attack surface and requires a different approach to security than traditional IT infrastructure. Security teams need a base understanding of Kubernetes architecture, configurations and deployment processes to effectively manage risk. Here’s what you need to know.