Cybersecurity Innovation Pulse #42: CISOs Guide to Materiality; Automotive Threat Matrix; OODA Loop; Security Products News and More!
Mar. 21st - Mar. 28th
Welcome to Issue 42 of the Cybersecurity Innovation Pulse! I'm Darwin Salazar, Product Manager at Monad and a former Detection Engineer. Each week, I distill the latest and most exciting developments in cybersecurity innovation into digestible, bite-sized updates. If you’re serious about staying at the forefront of the latest in security products, attacker techniques, and industry news make sure to hit the “Subscribe” button below to get my insights delivered straight to your inbox every week 📩 🚀
Howdy! This week’s innovation pulse is a bit different and lighter than usual. Pretty busy as of late, all good things though, thankfully!
We’ll be back to regularly scheduled programming next week and I have a special piece I’m writing coming down the pipe so keep an eye out for that. That said, let’s jump into this week’s issue!
Industry🛰
Auto-ISAC Launches Automotive Threat Matrix for Cybersecurity - TelematicsWire
U.S. Treasury Report: Cyber Risks & AI Tools - CyberScoop
CISA Cyber Incident Reporting Critical Infrastructure - CyberScoop
Google’s New AI Search Results Promotes Sites Pushing Malware Scams - BleepingComputer
UN Adopts Symbolic Resolution: Secure Trustworthy AI - DarkReading
Hackers Earn $1,132,500 for 29 Zero-Days at Pwn2Own Vancouver - BleepingComputer
Top Python Developers Hacked in Sophisticated Supply Chain Attack - SecurityWeek
Product🛸
CrowdStrike Enhances CDR Capabilities for CI/CD Pipeline - CrowdStrike Blog
Can a Database-Oriented Operating System Make the Cloud More Secure? - DarkReading
Legit Security Releases Secrets Scanner to Detect Sensitive Data in Code - Help Net Security
Strata Identity Releases New Authentication Recipes - DarkReading
Coinbase Introduces Option for Travel Rule Universal Solution Technology Trust - Crowdfund Insider
Tradecraft🤺
Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters - Packet Storm Security
Securing Generative AI: Data Compliance and Privacy Considerations - AWS Security Blog
Threat Report: Examining the Use of AI in Attack Techniques - DarkReading
One More Time on SIEM Telemetry Log Sources - Anton on Security
Funding💰
Coro Raises $100M to Strengthen SME Protection - SiliconANGLE
Zafran Emerges from Stealth with Over $30M - Bluefield Daily Telegraph
BlueFlag Security Emerges from Stealth with $11.5M in Funding - SecurityWeek
Binarly Attracts $10.5M to Tackle Software Supply Chain Security - SecurityWeek
Greylock Makes $10M Bet on Bedrock Security - SecurityWeek
StealthMole Raises $7M Series A for Its AI-Powered Dark Web Intelligence Platform - TechCrunch
Tarsal Raises $6M in Seed Funding - FinSMEs
Leen Banks Early-Stage Funding for Data Security Technology - SecurityWeek
Extras🎬
A CISO’s Guide to Materiality and Risk Determination - DarkReading
AWS CISO: Cloud Customers Need to Secure AI Workloads - DarkReading
Four Generative AI Cyber Risks Keeping CISOs Up at Night and How to Combat Them - SiliconANGLE
AI weaponization becomes a hot topic on underground forums - Help Net Security
17 Billion Personal Records Exposed in Data Breaches in 2023 - Infosecurity Magazine
Successful Security Needs a Streamlined UX: Benedek Gagyi on ASW #278 - Security Weekly Productions
The OODA Loop: The Military Model That Speeds Up Cybersecurity Response - SecurityWeek
Bye For Now!
Happy Holy Week to all who celebrate! See you next week! 🚀