In May 2019, the Canadian non-profit organisation eQualitie released a report describing an attack campaign using web and phishing attacks against journalists and activists working on ...
The Cybersecurity and Infrastructure Security Agency (CISA) hosts the Industrial Control Systems Joint Working Group (ICSJWG) to facilitate information sharing and reduce the risk to the ...
More than half of organizations have adopted AI for security efforts, but a majority are more confident in results verified by humans, according to WhiteHat Security.
These developments may be going mostly unnoticed at the moment, but they'll have big long-term impacts on the AI sector.
EDPS Annual Report 2019: new EU data protection rules must produce promised result
Writing in the New York Times last month, Google CEO Sundar Pichai argued that it is “vital for companies to give …
This is Part 2 of a two-part series on Israel’s success as an innovation hub. Read Part 1 Zack Weisfeld builds companies. After graduating from Tel Aviv University, Weisfeld led ...
Farica Chang, director of Anderson Technologies, offers expert advice on how businesses can keep cybersecurity sharp while employees work remotely.
Headline news and global disorder are tools hackers take advantage of to make their next breach.
Continuing our series of third-party risk management (TPRM), this blog's topic surrounds the cyber ecosystem and how its security matters in relation to third party risk management. In our ...
A federal commission this week laid out its prescription for plugging holes in the nation’s cyber defenses, urging the government to add muscle in the form of a White House cyber director, ...
Who’s who when it comes to placing cyber talent
After your organization forms a general plan for tackling its cybersecurity and privacy risk management issues, it …
Attackers are capitalizing on the rise of misconfigured Internet-connected devices running the WS-Discovery protocol, and mobile carriers are hosting distributed denial-of-service weapons.