ModelScan - Protection Against Model Serialization Attacks, (Mon, Feb 17th)
Protect AI's OSS portfolio includes tools aimed at improving security of AI/ML software. These tools are meant for a wide range of engineering, security and ML practitioners including developers, security engineers/researchers, ML engineers, LLM...
Wi-Fi 7’s Multi-Link Operation (MLO) Dissection—from Packets to Performance
Wi-Fi 7’s STR MLO mode allows devices to transmit and receive data across multiple bands simultaneously. Learn how this improves throughput to make Wi-Fi 7 ideal for bandwidth-intensive applications.
My Very Personal Guidance and Strategies to Protect Network Edge Devices, (Thu, Feb 6th)
Last week, CISA and other national cyber security organizations published an extensive document outlining "Guidance and Strategies to Protect Network Edge Devices." [1] The document is good but also very...
Cisco's 2025 EMEA Cybersecurity Defender of the Year award goes to the team at SAP Enterprise Cloud Services, who raised the bar for overall security posture.
What do I mean by âIP volatilityâ? Today, many organizations use cloud services and micro-services. In such environments, IP addresses assigned to virtual machines or services can often be volatile, meaning they can change or be reassigned to...