article thumbnail

Quantum Computing: A Looming Threat to Organizations and Nation States

SecureWorld News

Glenn Kapetansky, Senior Principal & Chief Security Officer, Trexin: "For those who predict that quantum computing will break InfoSec, I want to point out that very smart people have been working equally long on next-gen cyber techniques that work in a post-quantum computing world.

article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

How exactly will artificial intelligence help bridge the infosec skills gap and what kinds of security work are still best left to humans? For example, they may think, "Hey, the user's going to give me an input and it's only going to be as long as maybe a DNS record." but they never actually checked that. This is another chunk.

InfoSec 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

How exactly will artificial intelligence help bridge the infosec skills gap and what kinds of security work are still best left to humans? For example, they may think, "Hey, the user's going to give me an input and it's only going to be as long as maybe a DNS record." but they never actually checked that. This is another chunk.

InfoSec 40
article thumbnail

SECURITY LEDGER PODCAST: SECURITY AUTOMATION IS (AND ISN'T) THE FUTURE OF INFOSEC

ForAllSecure

How exactly will artificial intelligence help bridge the infosec skills gap and what kinds of security work are still best left to humans? For example, they may think, "Hey, the user's going to give me an input and it's only going to be as long as maybe a DNS record." but they never actually checked that. This is another chunk.

InfoSec 40
article thumbnail

7 Best Attack Surface Management Software for 2024

eSecurity Planet

per year Tenable Tenable One, an exposure management platform Identifies assets using DNS records, IP addresses, and ASN, and provides over 180 metadata fields Tenable Attack Surface Management, Add-on for Splunk ISO/IEC 27001/27002 $5,290 – $15,076.50 Pricing is dependent on the quantity of Internet-facing assets.

Software 113
article thumbnail

Fighting Fire with Fire: API Automation Risks

Threatpost

A look at API attack trends such as the current (and failing) architectural designs for addressing security of these API transactions.