The deal will enhance the capabilities of both companies and provide customers with a more comprehensive way to protect their digital assets.
Read moreMaking Sure Lost Data Stays Lost
May 13 2023Retired hardware and forgotten cloud virtual machines are a trove of insecure confidential data. Here's how to ameliorate that weakness.
Read moreDubbed "ChattyGoblin," the China-backed actors use chatbots to scam Southeast Asian gambling companies.
Read moreThe Technology Innovation Institute’s year-long cryptographic challenge invites participants to assess concrete hardness of McEliece public-key encryption scheme.
Read moreNot just an active adversary, but a two-faced one, too.
Read moreOne long-awaited security move caused a ripple effect in the cybercrime ecosystem.
Read moreTed Chiang on the Risks of AI
May 12 2023Ted Chiang has an excellent essay in the New Yorker: “Will A.I. Become the New McKinsey?”
The question we should be asking is: as A.I. becomes more powerful and...
Read more
Regulators should apply a healthy skepticism to generative AI developments to guarantee a competitive marketplace.
Read moreBlack Hat Asia's NOC team gives a look inside what's really happening on the cyberfront during these events.
Read moreAs a way to enhance the security of MFA, Microsoft will require users to authorize login attempts by entering a numeric code into the Microsoft Authenticator app.
Read more
Recent Comments