Chief Scientist Emeritus Fabian Yamaguchi and foundational Code Property Graph technology recognized with IEEE Test of Time Award
GitHub Copilot, the AI-powered coding assistant, has emerged as a game-changer in the software development landscape. By harnessing the power of generative AI, Copilot promises to accelerate coding tasks, boost developer productivity, and even democratize coding by making it more accessible to newcomers. However, as with any transformative technology, there are caveats. In Copilot’s case, […]
READ MOREIntroduction: In the realm of cybersecurity, vulnerabilities can lurk in the most unexpected places, potentially exposing users to significant risks. Recently, a concerning security flaw was discovered in the highly regarded Eaton SecureConnect Security Alarm system, sending shockwaves through the industry. As security researchers, it is our duty to delve into the intricacies of this […]
The Qwiet AI team had a great time this past week at the Gartner Risk Summit. There were a lot of interesting sessions, engaging hallway conversations, and I had an opportunity to talk with folks one on one at our booth about the newly released prioritization options we released alongside our new licensing compliance […]
I couldn’t walk five feet at RSA recently without someone asking me about ChatGPT. The questions all boiled down to “ChatGPT—is it bad, really bad, or just plain horrible?” ChatGPT is all of these things, and at the same time it is none of them. ChatGPT is only what we make of it. Like any […]
Meta Platforms, formerly Facebook, was recently hit with a massive €1.2 billion fine for violating General Data Protection Regulation (GDPR) requirements. The unprecedented punitive measure comes as Meta is found guilty of transferring and storing personal data of European Union users in the United States. This event underscores the criticality of secure code and the […]
In the ever-evolving landscape of cybersecurity, zero-day vulnerabilities tend to steal the limelight. These newly discovered vulnerabilities are often seen as the epitome of sophisticated cyberattacks, capturing headlines and fueling the imagination of both the public and cybersecurity professionals. However, the reality is that while zero-day vulnerabilities may be intriguing, the majority of successful cyberattacks […]
Number of lines of code. Number of commits. Number of bugs caught. Such are the old metrics of development. All very macho, all very developer bro—and all not terribly effective. These days, development is about quality, not quantity. It is about closing the gap between development and business, so technology solves tangible problems. At cdCon […]
Artificial intelligence (AI) is a rapidly evolving technology that has the potential to transform various sectors of our society. However, with the great power of AI comes the great responsibility to ensure that it is used ethically, responsibly, and safely. Recently, the Biden Administration announced new actions to promote responsible AI innovation that protects Americans’ […]
These days, when we talk about attacks, we are talking about endpoints—those pinpoint openings that allow adverse entities to hack into our computer systems. The endpoints vary in attack surface: some are accessed through phishing, while others are achieved through bounties. But however they are reached, they loom large among cybersecurity professionals, with a tangibility […]
The Food and Drug Administration (FDA) recently issued new requirements mandating that medical devices be secured against cyberattacks. This move comes after a long-standing concern about the potential for these devices to be hacked and used to harm patients. This new requirement is a significant step towards securing medical devices, which have been increasingly […]