News

When it comes to employee-owned mobile devices, many organizations want to run away from the security risks of the bring-your-own-device-to-work trend. Intel chose to run toward them. See Also: Top 10 ...
The insider threat can come from a malicious insider who intends to commit fraud, steal intellectual property or damage your brand. Or it can come from an accidental insider who makes a costly mistake ...
Hackers targeting victims' networks last year primarily wielded stolen credentials, exploits for known and zero-day ...
Cyber scam operations in Southeast Asia have assumed industrial-scale proportions, warns a United Nations report highlighting ...
Hackers are using Chinese-speaking android malware as a service SuperCard X to carry out near-field communication relay ...
Australian organizations have forty days to prepare for a new law requiring mandatory reporting of ransomware payments to ...
Social engineering is the ultimate con - the bag of tricks employed by fraudsters who will lie, cheat and steal their way past your organization's security controls. Their goals: theft, fraud or ...
Artificial intelligence developers including OpenAI, Google and Microsoft are adopting rival Anthropic's open standard to speed up the capabilities of their chatbots by allowing them to access ...
Chatbots' popularity has been tempered from the start by the prospect of prompt injection attacks. Google DeepMind's CaMeL ...
In this episode, Frank Wang from Headway dives into the real-world challenges of cloud visibility as organizations scale and ...
Microsoft released what it describes as the most expansive 1-bit AI model to date, BitNet b1.58 2B4T. Unlike traditional ...
In this episode, Jenny Brinkley from AWS shares her perspective on protecting data in the age of Gen AI. She explores how ...