In next-gen, credential-harvesting attacks, phishing emails use cloud services and are free from the typical bad grammar or typos they've traditionally used (and which users have learned to flag).
Read moreIt's time to get ahead of attacks before they even happen.
Read moreIt Takes AI Security to Fight AI Cyberattacks
April 6 2023New threats from generative AI demand a generative AI security response.
Read moreScanning tools, supply-chain malware, Wi-Fi hacking, and why there should be TWO World Backup Days... listen now!
Read moreIn-person conversations are a productive way to understand the state of the industry and learn new techniques. Take advantage of peers' experience, compare notes, and boost your skill set....
Read moreAn emerging, illicit marketplace proves that financial cybercrime is still on the rise, with a need for countries to collectively put safeguards in place.
Read moreFaced with enterprise challenges, the Holy See looks to ensure it avoids a "holey" mobile device management solution.
Read moreResearch on AI in Adversarial Settings
April 6 2023New research: “Achilles Heels for AGI/ASI via Decision Theoretic Adversaries”:
As progress in AI continues to advance, it is important to know how advanced systems will make choices and...
Read more
BlackBerry integrates award-winning CylanceGUARD and BlackBerry AtHoc technologies for "combat-ready" cyber event continuity planning and response.
Read more
Recent Comments