Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

4 tips for securing GenAI-assisted development

Gartner predicts that generative AI (GenAI) will become a critical workforce partner for 90% of companies by next year. In application development specifically, we see developers turning to code assistants like Github Copilot and Google Gemini Code Assist to help them build software at an unprecedented speed. But while GenAI can power new levels of productivity and speed, it also introduces new threats and challenges for application security teams.

Trustwave's 2025 Cybersecurity Predictions: AI-Powered Attacks, Critical Infrastructure Risks, and Regulatory Challenges

As 2024 comes to a close, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. Here is the latest installment. As we look ahead to 2025, the landscape of cyber threats continues to evolve, presenting new challenges for cybersecurity professionals.

How AI is Revolutionizing Compliance Management

Organizations worldwide struggle with complex regulatory requirements. AI in compliance management emerges as a powerful solution to simplify these challenges. Modern businesses face unprecedented pressure to maintain rigorous compliance standards across multiple domains. AI for compliance transforms how companies approach regulatory requirements. Traditional methods consume significant resources and expose organizations to substantial risks.

80% of Cybersecurity Leaders Prefer Platform-Delivered GenAI for Stronger Defense

Adversaries are advancing faster than ever, exploiting the growing complexity of business IT environments. In this high-stakes threat landscape, generative AI (GenAI) is a necessity. With organizations grappling with skills shortages, sophisticated adversaries and operational complexity, 64% of security professionals have already kicked off their GenAI purchase journey.

Advancing the Arctic Wolf Aurora Platform with Cylance's Endpoint Security Suite

Arctic Wolf has taken a decisive step forward in our mission to end cyber risk by acquiring Cylance, a pioneer of AI-based endpoint protection. With this acquisition, Arctic Wolf ushers a new era of simplicity and automation to the endpoint security market that will deliver the security outcomes endpoint security customers have been struggling to achieve for years.

Data De-identification: Definition, Methods & Why it is Important

Data is essential. Businesses, researchers, and healthcare providers rely on it. However, this data often contains sensitive personal information, creating privacy risks. Data de-identification helps mitigate these risks by removing or altering identifiers. This makes it harder to link data back to specific individuals. This process is vital for protecting sensitive information and allowing safe data use. Privacy is a growing concern. Regulations like HIPAA set strict rules.

The Evolution of Cyber Attacks: Lessons for Staying Safe in 2025

The pace at which cyberattacks are evolving has accelerated in recent years, driven by technological advances, particularly artificial intelligence (AI) and machine learning. The sophistication of cybercriminals' tactics has reached unprecedented levels, posing new challenges for traditional cybersecurity defenses. In this article, we will explore the key developments in cyber threats, identify emerging risks, and offer practical lessons on how businesses and individuals can stay safe in 2025.

Understanding Shadow IT in the Age of AI

With the emergence of artificial intelligence (AI), there has been a flurry of new terms to describe an increasing variety of new problems. Some of those problems have been around for decades but are now more difficult to manage due to the versatility of AI-based tools and applications. One of those ongoing challenges is shadow IT with a new class of problems classified as shadow AI.