Cloud Bytes Webinars's profile photo

Cloud Bytes Webinars

Articles

  • 1 month ago | cloudsecurityalliance.org | Cloud Bytes Webinars |Nat Smith

    Originally Published by CXO Revolutionaries on January 28, 2025. Written by: Nat Smith, Contributor, Zscaler. New resolutions already fading? This hack, inspired by British Cycling, can get you back on track. Now that we are at the tail end of the first month of the new year, many teams start to slip away from all the new things they’ve planned and float back to their old ways.

  • 2 months ago | cloudsecurityalliance.org | Cloud Bytes Webinars |Emily Burns

    Originally published by Abnormal Security. Written by Emily Burns. Artificial Intelligence (AI) has reshaped nearly every industry, but its impact on cybersecurity is particularly transformative. While AI opens doors to unparalleled efficiencies and innovation, it also gives rise to a new generation of cyberthreats that are faster, smarter, and more adaptable than ever.

  • Jan 16, 2025 | cloudsecurityalliance.org | Cloud Bytes Webinars |Raghu Nandakumara

    Originally published by Illumio on December 9, 2024. Written by Raghu Nandakumara, Head of Industry Solutions, Illumio. Last month, I attended the Illumio World Tour stops in New York City and Sydney as well as Black Hat MEA. One topic dominated conversations: generative AI (GenAI) and its growing use in cyberattacks. Cybercriminals are using AI technology to quickly create and deploy attacks that are smarter, faster, and more convincing than ever before.

  • Jan 15, 2025 | cloudsecurityalliance.org | Cloud Bytes Webinars

    Artificial Intelligence (AI) has become a cornerstone of innovation, transforming industries and reshaping how we interact with technology. At the heart of this revolution lies Large Language Models (LLMs)—AI systems designed to understand and generate human-like text. However, even the most advanced AI needs direction from a human to perform effectively. Enter prompt engineering, the art of crafting instructions that guide AI behavior and generate meaningful outputs.

  • Jan 14, 2025 | cloudsecurityalliance.org | Cloud Bytes Webinars |Itzik Alvas

    Written by Itzik Alvas, Entro. Secrets & Non-Human Identities (NHIs) security in hybrid cloud environments is a critical challenge in today’s IT landscape. Passwords, API keys, certificates, and tokens are not just digital assets; they are the lifeblood of your organization’s security. Protecting these non-human identities is essential for maintaining the integrity of your infrastructure.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →