The collaboration with industry partners will improve collective AI defenses. Trusted contributors receive protected and anonymized data on real-world AI incidents.
Creaky old identity-management systems can't keep up with today's cloud-based, remote, zero-trust workplaces. Here's how a modern IAM system prepares your organization for the future.
iPhone 'VoiceOver' Feature Could Read Passwords Aloud
CVE-2024-44204 is one of two new Apple iOS security vulnerabilities that showcase an unexpected coming together of privacy snafus and accessibility features.
Insider Threat Damage Balloons as Visibility Gaps Widen
A growing number of organizations are taking longer to get back on their feet after an attack, and they're paying high price tags to do so — up to $2M or more.
Microsoft, DOJ Dismantle Russian Hacker Group Star Blizzard
The successful disruption of notorious Russian hacker group Star Blizzard's operations arrives one month out from the US presidential election — one of the APT's prime targets.
Best practices for responsible Al use in cybersecurity
Al plays a critical role in modern cybersecurity, helping organizations predict and prevent threats with greater speed and precision. However, ensuring Al is used responsibly is essential to maintaining trust and protecting sensitive data.
DOJ, Microsoft take down 107 Russian-backed Star Blizzard domains
Security pros says while Star Blizzard will most likely regroup, it does degrade their operations and gives defenders some time to deploy AI-powered tools.
Evaluating Al-augmented cybersecurity service providers
As Al continues to transform how cybersecurity services are delivered, it's crucial to choose a security service provider that leverages Al responsibly and effectively.