Learning how to break the latest AI models is important, but security researchers should also question whether there are enough guardrails to prevent the technology's misuse.
Read moreHow CISOs Can Craft Better Narratives for the Board
April 18 2023Communicating cyber-risk upward to C-suite and board takes simplification and better understanding of the audience.
Read moreThousands of restaurants impacted by what Aloha PoS parent company NCR says was a ransomware attack on one of its data centers.
Read moreName That Toon: Lucky Charm
April 18 2023Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreUSB charging stations - can you trust them? What are the real risks, and how can you keep your data safe on the road?
Read moreTop 5 Data Security RSAC 2023 Sessions to Attend
April 17 2023A little preconference reconnoitering of upcoming seminars, keynotes, and track sessions makes plotting your days easier. Here's one attendee's list.
Read moreBusinesses must leverage state and local guidance — along with technology — to maintain secure, compliant infrastructure.
Read moreSwatting as a Service
April 17 2023Motherboard is reporting on AI-generated voices being used for “swatting”:
In fact, Motherboard has found, this synthesized call and another against Hempstead High School were just one small part...
Read more
Friday Squid Blogging: Colossal Squid
April 15 2023Interesting article on the colossal squid, which is larger than the giant squid.
The article answers a vexing question:
So why do we always hear about the giant squid and...
Read more
The threat group behind the SolarWinds supply-chain attacks is back with new tools for spying on officials in NATO countries and Africa.
Read more
Recent Comments