Monthly Archives: October 2024
Moving beyond legacy IAM to better secure the identities of a hybrid workforce
The modern workplace's identity and access management (IAM) needs have radically changed from what they were even a decade ago. We're d...
How AI can mitigate the wave of email attacks in the healthcare industry
COMMENTARY: There’s no denying that we need a strong and secure healthcare sector in the United States—the industry saves countless liv...
The New Frontier: Crafting robust AI Governance in a fast-evolving landscape
LAS VEGAS - As artificial intelligence (AI) continues to weave itself into every aspect of business, industry leaders are sounding the ...
Two sides of the AI coin: Enabling AI and AI enabled
The heavy networking and security demands of AI implementation will require revamped architectures and security tools, many experts say...
White House endorses collaboration with cybersecurity researchers
The White House has put on its white hat and tossed its weight behind the cybersecurity research community.In a notice from the Biden a...
Embargo ransomware analysis exposes developing toolkit of new group
The Embargo ransomware group is a new and immature suspected ransomware-as-a-service (RaaS) gang that uses a custom Rust-based toolkit,...
Third-party vendors drive 45% of breaches in US energy sector
A joint study by SecurityScorecard and KPMG found that 90% of companies in the energy sector that sustained multiple breaches had secur...
Audit + Beyond 2024: AI and the Future of Compliance — Three minutes with Anton Dam, AuditBoard’s AI champ
LAS VEGAS — The world of audit and compliance has become a labyrinth, with new regulations cropping up faster than companies can build ...
Community Fibre raises £125m in latest funding round
News
The funding will be used to help encourage take-up of the company’s fibre services
UK altnet Community Fibre has raised £125 mil...
Increased stealth integrated into novel Grandoreiro banking trojan variants
More advanced anti-detection mechanisms — including ciphertext stealing encryption, domain generation algorithm usage for command-and-c...