![Exclusive: Kong launches AI Gateway to help enterprises govern and scale generative AI](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2024/06/nuneybits_Vector_art_of_King_Kong_made_of_computer_code_d7413c3d-86ec-44ce-9690-c934450c4d61.webp?w=350&h=175&crop=1)
Topic > Software Security
![Exclusive: Kong launches AI Gateway to help enterprises govern and scale generative AI](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2024/06/nuneybits_Vector_art_of_King_Kong_made_of_computer_code_d7413c3d-86ec-44ce-9690-c934450c4d61.webp?w=350&h=175&crop=1)
![Microsoft delays broad release of Recall AI feature due to security concerns](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2024/06/nuneybits_The_red_Windows_logo_sitting_alone_on_an_otherwise_em_e400203c-f2ce-481f-8cfa-f67e3c160e20.webp?w=350&h=175&crop=1)
Microsoft delays broad release of Recall AI feature due to security concerns
![Why data breaches have become ‘normalized’ and 6 things CISOs can do to prevent them](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2024/05/a-realistic-3d-render-of-a-bustling-security-opera-W9Se80y5T6aGsLVGU6uL4g-AJF8F1h2TgW55ulhxi2Icw-transformed.jpeg?w=350&h=175&crop=1)
Guest
Why data breaches have become ‘normalized’ and 6 things CISOs can do to prevent them
![Gen AI innovation race is leading to security gaps, according to IBM and AWS](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2024/05/ai-guardrails-cloud.jpg?w=350&h=175&crop=1)
Gen AI innovation race is leading to security gaps, according to IBM and AWS
![Fortanix launches Key Insight to help enterprises manage cryptographic security risks](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2024/04/nuneybits_Cybersecurity_solution_data-first_cryptographic_secur_c9d4ea38-92f7-45aa-ab46-43a2c0cadc80-transformed.webp?w=350&h=175&crop=1)
Fortanix launches Key Insight to help enterprises manage cryptographic security risks
![Psychological safety is key to managing security teams](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2024/04/a-realistic-high-quality-image-of-a-stressed-out-w-FI5JBpALQlGehWfkke3QIw-SASp7EhERgmLdzasPLKYnQ-transformed.jpeg?w=350&h=175&crop=1)
Guest
Psychological safety is key to managing security teams
![IOActive finds hackers have compromised some game controllers](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2024/04/slide-22-1200px_675px.png?w=350&h=175&crop=1)
IOActive finds hackers have compromised some game controllers
![Key takeaways from Forrester’s Top Trends in IoT Security 2024](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2024/04/16-9-IoT-trends-story-4-9-24.jpg?w=350&h=175&crop=1)
Key takeaways from Forrester’s Top Trends in IoT Security 2024
![Microsoft expands Priva suite to tackle evolving privacy landscape](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2024/04/nuneybits_Microsoft_windows_logo_made_of_computer_code_d69d5e95-e90b-42a1-9cdf-532e44095c61-transformed.webp?w=350&h=175&crop=1)
Microsoft expands Priva suite to tackle evolving privacy landscape
![Menlo Security report: Cybersecurity risks surge with AI adoption](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2024/02/nuneybits_An_illustration_showing_the_Apple_logo_at_the_top_cen_816f362e-48b7-45a3-9388-f72b89bcc1d6-transformed.webp?w=350&h=175&crop=1)
Menlo Security report: Cybersecurity risks surge with AI adoption
![Cybersecurity New Year’s resolutions every enterprise leader (and user) should make](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2024/01/DALL·E-2024-01-02-17.12.45.png?w=350&h=175&crop=1)
Cybersecurity New Year’s resolutions every enterprise leader (and user) should make
![The password identity crisis: Evolving authentication methods in 2024 and beyond](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/12/DALL·E-2023-12-29-18.58.16-a-futuristic-neon-lit-cyborg-face-in-profile-1-1.png?w=350&h=175&crop=1)
The password identity crisis: Evolving authentication methods in 2024 and beyond
![Five bold cybersecurity predictions for 2024](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2021/11/GettyImages-151815234.jpg?w=350&h=175&crop=1)
Guest
Five bold cybersecurity predictions for 2024
![All I really need to know about cybersecurity, I learned in kindergarten](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/12/DALL·E-2023-12-22-17.37.09-kindergarten-learning-about-cybersecurity-lock-crayon.png?w=350&h=175&crop=1)
Guest
All I really need to know about cybersecurity, I learned in kindergarten
![Ransomware gangs increasingly crave the media spotlight](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/12/DALLyE_2023-12-21_19.05.29_-_hacker_in_a_hoodie_declining_press_interview__red_blue_black_futuristic-transformed.png?w=350&h=175&crop=1)
Ransomware gangs increasingly crave the media spotlight
![The age of weaponized LLMs is here](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/12/DALL·E-2023-12-17-HERO-IMAGE-LLMS-used-for-attacks.jpg?w=350&h=175&crop=1)
The age of weaponized LLMs is here
![The CISO risk calculus: Navigating the thin line between paranoia and vigilance](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/12/nuneybits_zero_trust_in_cybsecurity_2842ba76-7312-4eb2-9573-c0d5925a810d.png?w=350&h=175&crop=1)
Guest
The CISO risk calculus: Navigating the thin line between paranoia and vigilance
![Protecting against new Kubernetes threats in 2024 and beyond](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/12/MidJourney-cloud-security.png?w=350&h=175&crop=1)
Guest
Protecting against new Kubernetes threats in 2024 and beyond
![Breaches happen: It’s time to stop playing the blame game and start learning together](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/12/nuneybits_Cybersecurity_in_the_style_of_Petros_Afshar_2a324c6b-1a00-4b37-8642-d07be0dd12d5.png?w=350&h=175&crop=1)
Guest
Breaches happen: It’s time to stop playing the blame game and start learning together
![Microsoft goes all-in on Gen AI with security copilot and Defender XDR](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/11/DALL·E-2023-11-15-10.53.26-A-vector-art-cyberpunk-synthwave-style-image-featuring-a-programmer-a-young-Caucasian-man-with-short-hair-wearing-sunglasses-typing-on-a-laptop.-.png?w=350&h=175&crop=1)
Microsoft goes all-in on Gen AI with security copilot and Defender XDR
![How generative AI is defining the future of identity access management](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2022/08/GettyImages-1206029692.jpg?w=350&h=175&crop=1)
How generative AI is defining the future of identity access management
![Forrester predicts A.I. code flaws will enable new attacks next year](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/11/nuneybits_A_neural_network_art_piece_depicting_the_contrast_bet_040309b7-fbda-4b61-b34e-702688bbe854-transformed.png?w=350&h=175&crop=1)
Forrester predicts A.I. code flaws will enable new attacks next year
![Cybersecurity industry responds to SEC charges against SolarWinds and former CISO](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2021/11/solarwinds.jpg?w=350&h=175&crop=1)
Cybersecurity industry responds to SEC charges against SolarWinds and former CISO
![Surviving a ransomware attack begins by acknowledging it’s inevitable](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2021/04/GettyImages-1078920594-e1658249615836.jpg?w=350&h=175&crop=1)
Surviving a ransomware attack begins by acknowledging it’s inevitable
![The top 20 admin passwords will have you facepalming hard](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/09/cfr0z3n_photorealistic_a_humanoid_robot_facepalms_bf618b77-1923-4780-8a15-bc5d1cbae834.png?w=350&h=175&crop=1)
The top 20 admin passwords will have you facepalming hard
![Cranium raises $25M to fund enterprise AI monitoring, security, and compliance platform](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/10/cfr0z3n_a_robot_peers_inside_an_open_PC_tower_at_the_circuitboa_194dd42e-576b-49a2-8341-b77eabcee85d.png?w=350&h=175&crop=1)
Cranium raises $25M to fund enterprise AI monitoring, security, and compliance platform
![Okta’s breach shows why identities come first in a zero trust world](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/10/DALL·E-2023-10-25-14.43.17-Photo-of-a-man-in-a-dimly-lit-room-slowly-peeling-away-his-face-like-a-mask.-As-he-does-so-bright-and-luminous-computer-code-is-revealed-underneath.png?w=350&h=175&crop=1)
Okta’s breach shows why identities come first in a zero trust world
![Anonybit raises $3M to further build out biometric security platform Genie](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/10/cfr0z3n_cyber_art_synthwave_clean_lines_abstract_neon_fingerpri_31de9d4d-16b1-4b66-8c5f-7b0d1e79cc85.png?w=350&h=175&crop=1)
Anonybit raises $3M to further build out biometric security platform Genie
![E-commerce fraud to cost $48 billion globally this year as attacks skyrocket, report says](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/09/nuneybits_e-commerce_fraude_as_an_abstract_painting_433fefc3-c7dc-454a-a665-dabcd88cb562-transformed.png?w=350&h=175&crop=1)
E-commerce fraud to cost $48 billion globally this year as attacks skyrocket, report says
![Sony investigating alleged ransomware attack, group threatens to sell data](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2020/12/DSC_4870.0.0-e1608001481901.jpg?w=350&h=175&crop=1)
Sony investigating alleged ransomware attack, group threatens to sell data
![Microsoft’s bold move: Introducing AI assistant ‘Copilot’ in Windows 11](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/09/16by9.jpg?w=350&h=175&crop=1)
Microsoft’s bold move: Introducing AI assistant ‘Copilot’ in Windows 11
![Cyber resilience through consolidation part 1: The easiest computer to hack](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/04/VB_security-breach-padlock_3_1200x800.jpg?w=350&h=175&crop=1)
Guest
Cyber resilience through consolidation part 1: The easiest computer to hack
![Proton debuts VPN for Business, enabling IT departments to control access to content and apps](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/08/cfr0z3n_flat_illustration_line_art_minimal_surreal_a_tiny_perso_a621903c-5c13-4134-8c4e-0b36cab4319e.png?w=350&h=175&crop=1)
Proton debuts VPN for Business, enabling IT departments to control access to content and apps
![SandboxAQ unveils Sandwich, an open-source meta-library of cryptographic algorithms](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/08/Sandwich.jpg?w=350&h=175&crop=1)
SandboxAQ unveils Sandwich, an open-source meta-library of cryptographic algorithms
![Dropzone AI launches autonomous AI agent to investigate security alerts, raises $3.5M in seed funding](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/08/profile_pic_alt.jpg?w=350&h=175&crop=1)
Dropzone AI launches autonomous AI agent to investigate security alerts, raises $3.5M in seed funding
![Tromzo secures $8M to lead the charge in AI-powered application security posture management](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/08/nuneybits_vector_art_of_cloud_security_as_a_renaissance_painti_6974ed9d-c15f-4b67-9213-7cbe0fc2c545.png?w=350&h=175&crop=1)
Tromzo secures $8M to lead the charge in AI-powered application security posture management
![Endor Labs raises $70M to ease application security, streamline developer productivity](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/08/Endor-Labs.png?w=350&h=175&crop=1)
Endor Labs raises $70M to ease application security, streamline developer productivity
![Torq launches Torq Socrates, an AI agent for Tier-1 SecOps threat resolution](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/08/TORQ_Venturebeat_Socrates_Banner_L2R5.png?w=350&h=175&crop=1)
Torq launches Torq Socrates, an AI agent for Tier-1 SecOps threat resolution
![Itseez3D launches Avatar SDK Deep Fake Detector to bolster user identity protection](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/08/cfr0z3n_a_humanoid_robot_examines_photo_portraits_displayed_on__1c5f8810-eb96-4d59-92b5-f8fbdef3ae2d.png?w=350&h=175&crop=1)
Itseez3D launches Avatar SDK Deep Fake Detector to bolster user identity protection
![Cisco AppDynamics: 85% of tech experts say application observability is a strategic priority for managing cloud complexity](https://nekopoi.vihentai.com/nekopoi/gjMt92YuQXYlJWZyVHduVmd6MHc0/wp-content/uploads/2023/07/CiscoAppdynamics-FSO-sponsored-article.jpg?w=350&h=175&crop=1)
Sponsored