From Code to Chaos: The Cybersecurity Risks of Gen AI

Intro to Gen AI In the last three years, it’s as if AI has become a household name. Though the term has been around since the 1950s, OpenAI’s release of ChatGPT in 2022 boosted its popularity and led to widespread adoption and innovation in the field, and it is showing no signs of slowing down. […]
The Hidden Danger of Insider Risk: Why Old-School Security Just Doesn’t Cut It

Let’s be real—insider threats are one of the biggest problems in cybersecurity today. You don’t always need an outside hacker to cause chaos. Sometimes, the threat is sitting right inside your own company. In fact, about 3 out of every 4 breaches last year involved people inside companies. And those breaches? They’re not cheap. The average one tied to insider activity cost companies almost $5 million.
What the Coinbase Breach Teaches Us About Insider Risk

In May, Coinbase disclosed a massive breach, one that exposed the personal data of over 69,000 users and could cost the company up to $400 million. The attackers didn’t break through firewalls or exploit zero days.
AI Security 101: What You Need to Know to Take Action

Artificial Intelligence (AI) has introduced both new challenges and new opportunities to cyber security. On the one hand, cyber criminals leverage AI capabilities to create attacks that are more advanced and with wider scale than anything before. This is possible, since AI is a huge force multiplier for these hackers. We’re covering that aspect of […]
What is Generative AI in Cybersecurity

Generative AI is a field within artificial intelligence. GenAI digests enormous amounts of data, and later creates new content, such as text, images, videos or music, based on what it learned from the data it digested. While the roots of generative AI go back to the 1950s and 1960s, it’s only in the last decade that GenAI leaped forward and gained wide adoption. The most famous leap, and public recognition, occurred in late 2022, when OpenAI launched its ChatGPT. This launch has shaken the business world in ways we don’t yet fully understand.
What is Cyber Security? The Different Types of Cybersecurity

You lock the doors and they come down the vents. You patch the system and they phish your senior copywriter. You upgrade your firewall and someone shares a sensitive link in Slack.
Cybersecurity plays out across cloud platforms, remote teams, legacy infrastructure, and a revolving door of unknown adversaries. It’s not only about protecting your data — it’s about managing risk, optimizing operations, reinforcing resilience, and defending trust and as much about strategy as it is software. And it never, ever stands still.
What is Insider Risk and How to Manage It

When most people think about cybersecurity they picture hackers breaking into networks from some far-off location. But what if the real risk is much closer to home? In fact, some of the biggest security threats companies face today come from inside. Not necessarily from people with bad intentions, but often from simple mistakes, negligence, or small oversights that spiral into big problems.
What Is Data Exfiltration | Detection & Prevention Techniques?

When they go to work on any given Tuesday morning, bank employees are not usually expecting a robbery. But, just in case, banks are prepared with multiple layers of security.
Their security would be incomplete if they just focused on keeping bad guys out; they also need systems in place to make it harder for anyone (even their own employees!) to steal the money.
Anzenna + Jamf: Uncover and Remediate Hidden Risks with AI-Powered Insights

Modern businesses face threats from all angles – and some of the most dangerous risks come from within. Misconfigured devices, shadow applications, and users operating outside security policy can fly under the radar – until it’s too late. That’s why Anzenna and Jamf teamed up. Anzenna is now a Jamf Solution partner and is listed […]
Insider Security Risk: A Growing Pandemic in Cybersecurity

As a former CISO with over 25 years of experience, I’ve witnessed some of the most damaging security breaches—most of which were caused by Insiders. Insiders refers to employees, contractors, and anyone with legitimate access to an organization’s environment. Whether intentional or accidental, insider actions remain a primary vector for cyber threats. Common Insider Risks […]