Reveal(x) Detects Data Leaks from Employee Use of ChatGPT
Since OpenAI launched ChatGPT, the use of AI as a service (AIaaS), including generative AI tools, has exploded.
Since OpenAI launched ChatGPT, the use of AI as a service (AIaaS), including generative AI tools, has exploded.
The risk of external suppliers, best security practices and the ZeroFox approach
Across all industries, digital transformation created new challenges for cybersecurity teams
Upgrading physical security equipment with physical security intelligence
VERBUND selected ExtraHop Reveal(x) to help monitor network traffic in real time, detect anomalies, and feed the results into the central Security Operation Center
The pharmaceutical industry gained significant attention with the outbreak of the coronavirus (COVID-19) crisis
Pegasus is malware that infects iPhone devices enabling attackers to steal critical and private data, including phone calls, photos, and messages
In the following article you will find all the data protection regulations for financial services, as well as the security risks they face. Finally, we recommend 5 best practices to comply with these regulations effectively
ICMP is a network-level protocol that provides information about newtork transmission issues. Learn how ICMP tunneling works, how to detect ICMP tunneling, and how to prevent these types of attacks in this article.
Rapid7 wants to share an update concerning the security incident disclosed by Codecov and its potential impact on our company and customers