Click any tag below to further narrow down your results
Links
SubImage helps organizations manage their cloud and on-premises security by mapping infrastructure, identifying vulnerabilities, and addressing misconfigurations. It uses AI to provide actionable insights and integrates easily with existing tools without requiring maintenance.
This article details a cloud attack where a threat actor gained administrative access to an AWS environment in under 10 minutes, utilizing stolen credentials from public S3 buckets. The attacker leveraged large language models to automate tasks such as reconnaissance and malicious code generation, ultimately compromising multiple AWS principals.
The article argues that current cloud security practices often compromise between speed and safety, leading to vulnerabilities. It advocates for a new approach using agentic AI, open innovation, and real-time insights to create a more effective security posture.
Sysdig has introduced an AI-powered vulnerability management solution that enhances remediation efforts by providing actionable insights and guidance. By integrating runtime context and automating recommendations, Sysdig enables security teams to quickly address high-risk vulnerabilities, significantly reducing the time to remediate and improving collaboration between security and development teams.
The article discusses the capabilities of a next-generation AI-powered Cloud-Native Application Protection Platform (CNAPP) designed to enhance security for cloud-native environments. It highlights the platform's advanced features, which include automated threat detection, compliance monitoring, and vulnerability management, aimed at protecting applications and data in dynamic cloud settings.
Maze has launched a new AI-driven solution for vulnerability management, raising $31 million to help organizations better control cloud security breaches. The AI agents are designed to identify and resolve critical vulnerabilities, reducing false positives and significantly shrinking vulnerability backlogs, allowing security teams to respond more effectively to threats.