From Feeling Alone to Feeling Heard: The Potential of AI Companionship

Feelings of loneliness can be frustrating and disheartening at best, dangerous at worst. Nearly one in four adults globally experiences deep social isolation. If not addressed promptly and appropriately, these feelings of loneliness can impair work performance and increase the risk of heart disease, stroke, and dementia. The office of the…

Rehan Jalil, CEO of Securiti – Interview Series

Rehan Jalil is the CEO of Securiti.AI, Venture Advisor at Mayfield Fund and an investor and mentor to many Silicon Valley startups. He was the SVP and GM for Cloud Security at Symantec. Securiti AI is an enterprise-grade centralized platform that enables the safe use of data…

Distilled Giants: Why We Must Rethink Small AI Development

In recent years, the race to develop increasingly larger AI models has captivated the tech industry. These models, with their billions of parameters, promise groundbreaking advancements in various fields, from natural language processing to image recognition. However, this relentless pursuit of size comes with significant drawbacks…

Blockchain could solve the monopolised AI ecosystem | AI News

The AI industry has always been the “futuristic view” for humans, whether in movies, cartoons, or real life. Computers work, think and act on behalf of futuristic humans – well, except in the Dune movies. In the past half-decade, artificial intelligence has become the hottest topic…

UK backs smaller AI projects while scrapping major investments

The UK government has announced a £32 million investment in almost 100 cutting-edge AI projects across the country. However, this comes against the backdrop of a controversial decision by the new Labour government to scrap £1.3 billion in funding originally promised by the Conservatives for tech…

CISA’s “Secure by Demand” guidance is must-read – CyberTalk

EXECUTIVE SUMMARY:

Earlier today, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), distributed a new “Secure by Demand” guide.

The intention is to assist organizations in driving a more secure technology ecosystem by ensuring that cyber security is embedded from the start.

“This guidance is a wake-up call for any company that missed out on the costs and outages caused by Solar Winds, Log4J, Snowflake and CrowdStrike,” says Check Point CISO Pete Nicoletti.

Why the guide

In cyber security, procurement teams tend to grasp the fundamentals of cyber security requirements in relation to tech acquisitions. However, teams often fail to identify whether or not vendors truly embed cyber security into development cycles from day one.

The guide is designed to help organizations discern this type of critical information when evaluating vendors. It provides readers with questions to ask when buying software, considerations to work through regarding product integration and security, along with assessment tools that allow for grading of a product’s maturity against “secure-by-design” principles.

More information

The Secure by Demand guide is a companion piece to the recently released Software Acquisition Guide for Government Enterprise Consumers: Software Assurance in the Cyber-Supply Chain Risk Management (C-SCRM) Lifecycle.

While the latter focuses on government enterprises, this guide broadens the scope to encompass a wider range of organizations across various sectors.

Key points to note

  • The two guides work in tandem to provide a comprehensive approach to secure software acquisition and supply chain risk management.
  • While the software acquisition guide targets government entities, the demand guide offers insights that are applicable to private sector organizations, non-profits and other institutions.

CISA strongly advises organizations to thoroughly review and implement the recommendations from both guides.

Each guide offers practical, actionable steps that can be integrated into existing procurement and risk management frameworks. Yet, that alone is not enough, according to Check Point Expert Pete Nicoletti…

“In addition to implementing this guidance, companies should add supply chain-related security events to their incident response planning and tabletop exercises to ensure they can recover quickly and with less impact. Further, review supplier contracts to ensure that expensive outages caused by them, offer up their cyber insurance, rather than just recovering the license cost,” he notes.

Get the Secure by Demand Guide: How Software Customers Can Drive a Secure Technology Ecosystem right here.

Lastly, to receive cyber security thought leadership articles, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.

Pronounce AI Review: Refine Your English with Real-Time AI

Mastering English can be an uphill battle in language learning, especially when coaches have a hefty price tag and limited availability. Luckily, I stumbled upon the perfect solution I’m excited to share: Pronounce AI! It offers a free version with instant AI-powered feedback to refine your…

OpenAI hit by leadership exodus as three key figures depart

OpenAI is facing a leadership crisis as three key figures announce their departure. The news comes amid a tumultuous year for the AI powerhouse, marked by legal battles and high-profile exits. John Schulman, a co-founder of OpenAI, is leaving for rival Anthropic. Schulman confirmed his departure…

Derek Collison, Founder & CEO of Synadia – Interview Series

Derek Collison is the Founder & CEO of Synadia. Synadia invented the open source connective technology, NATS.io. With NATS you can easily connect all your applications and data at a global scale, no matter what language they are written in or where they are running. Derek…