#1 Trusted Cybersecurity News Platform
Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News

The Hacker News | Videos

Stop Chasing Alerts, Start Validating Exposures — Handle Them Like a Pro

Stop Chasing Alerts, Start Validating Exposures — Handle Them Like a Pro

Sept 09, 2024 Vulnerability Management / Exposure Management
Organizations trying to modernize their traditional vulnerability programs are rapidly heading towards a bigger challenge as they amass an even larger volume of exposures they are not equipped to address. This video explores the history and limitations of legacy vulnerability management and why exposure management is the modern solution for addressing vulnerabilities, misconfigurations, and asset risks across on-prem and cloud environments.  Learn how exposure validation and prioritization enhance security teams' efficiency by focusing on the most critical threats first. Contact us to explore the Picus Security Validation Platform and see how it empowers teams to validate and manage exposures continuously. To learn more, register for t he 2024 Exposure Validation Briefing, where industry experts will discuss the latest trends in Continuous Threat Exposure Management (CTEM).
Why You Should Consider Leveraging Your Python Skills to Code Securely on Blockchain

Why You Should Consider Leveraging Your Python Skills to Code Securely on Blockchain

May 01, 2024 Blockchain / Technology
It's never been easier to experience the power of a decentralized, transparent, immutable and secure blockchain. Dedicated to breaking down the barriers to building on blockchain,  Algorand  now adheres to Python semantic compatibility—unlike other pythonic languages in the blockchain industry—meaning that the basic tooling (syntax highlighting, linting, etc.) works right out of the box, with more updates to be release later this year. Why build on blockchain? It offers permanent, transparent record-keeping, enables traceability and provenance, and unlocks opportunities for innovation across industries. Bring your existing Python skills, existing testing framework, and favorite IDE to start building securely on the blockchain with  Algorand's AlgoKit!   Join Algorand's John Woods, Min Wei and Marc Vanlerberghe as they delve into the practical applications of Python in blockchain development in general, discussing why Python's simplicity and versatility make it an i
Securing SaaS Apps in the Era of Generative AI

Securing SaaS Apps in the Era of Generative AI

May 01, 2024 Artificial Intelligence / SaaS Security
In this latest video with The Hacker News, Caroline Rosenberg from Adaptive Shield highlights the cybersecurity risks introduced by generative AI tools like ChatGPT for  SaaS applications . Employees often misplace trust in GenAI tools to automate work without fully understanding the implications and methodology of the technology. Without proper governance of these AI controls, organizations may be exposed to data leakage, breaches, and compliance violations.  Watch this video to learn how using  SaaS Security Posture Management  (SSPM) can help enterprises adopt GenAI safely while strictly managing its risks. Using a robust SSPM solution empowers security teams to detect and defend against GenAI threats, as follows: Determine security posture for GenAI-enabled apps and pinpoint those with heightened risk. Control security settings to prevent GenAI data leakage or any exposure including identifying excessive user access and permissions. Identify shadow and 3rd party apps 
Trending News
Cybersecurity Resources