Even with common security platforms like CASBs, organizations struggle to deal with the volume of apps and accounts that interact with business-critical data. The pressure of increasing software-as-a-service (SaaS)...
Read moreEven with common security platforms like CASBs, organizations struggle to deal with the volume of apps and accounts that interact with business-critical data. The pressure of increasing software-as-a-service (SaaS)...
Read moreHacker AI vs. Enterprise AI: A New Threat
March 23 2019Artificial intelligence and machine learning are being weaponized using the same logic and functionality that legitimate organizations use. The adversarial use of artificial intelligence (AI) and machine learning (ML)...
Read moreHacker AI vs. Enterprise AI: A New Threat
March 23 2019Artificial intelligence and machine learning are being weaponized using the same logic and functionality that legitimate organizations use. The adversarial use of artificial intelligence (AI) and machine learning (ML)...
Read moreTwo Found Guilty in Online Dating, BEC Scheme
March 23 2019Cybercriminals involved in the operation created fake online dating profiles and tricked victims into sending money to phony bank accounts. Two men have been found guilty for their roles...
Read moreTwo Found Guilty in Online Dating, BEC Scheme
March 23 2019Cybercriminals involved in the operation created fake online dating profiles and tricked victims into sending money to phony bank accounts. Two men have been found guilty for their roles...
Read moreAlleged Child Porn Lord Faces US Extradition
March 23 2019In 2013, the FBI exploited a zero-day vulnerability in Firefox to seize control over a Dark Web network of child pornography sites. The alleged owner of that ring – 33-year-old...
Read moreAlleged Child Porn Lord Faces US Extradition
March 23 2019In 2013, the FBI exploited a zero-day vulnerability in Firefox to seize control over a Dark Web network of child pornography sites. The alleged owner of that ring – 33-year-old...
Read moreInside Incident Response: 6 Key Tips to Keep in Mind
March 23 2019Experts share the prime window for detecting intruders, when to contact law enforcement, and what they wish they did differently after a breach. (Image: Jcomp – stock.adobe.com) Most data...
Read moreInside Incident Response: 6 Key Tips to Keep in Mind
March 23 2019Experts share the prime window for detecting intruders, when to contact law enforcement, and what they wish they did differently after a breach. (Image: Jcomp – stock.adobe.com) Most data...
Read more
Recent Comments