Cyber Security
-
Matt Hillary20 March 2024Combatting the rise of malicious AI-powered malware
The ability of large language models (LLMs) to analyse vast amounts of data enables cyber criminals to faster and more…
Read More » -
Harsha Angeri19 March 2024Harness the power of GenAI for a multi-faceted approach to risk management
The telecommunications industry is on the verge of a transformative era, where interconnectivity and digital transformation are becoming the foundation…
Read More » -
Mickey Bresnan11 March 2024Semperis Researchers Discover a New Malicious Variant of the Attack Technique Used in the 2020 SolarWinds Breach
Newly discovered Silver SAML vulnerability can be exploited even if organisations have followed the security recommendations meant to defend against…
Read More » -
Hannah AlgarTom Allen1 March 2024From criminal pastime to cybersecurity tool: ethical hacking and other best security practices
In an era dominated by digital advancements and interconnected technologies, the cybersecurity landscape stands as the last line of defense…
Read More » -
Mick Baccio29 February 2024Navigating the heightened ransomware threat landscape of 2024
The ransomware threat is on the rise. It’s one of the top three most concerning threats for Chief Information Security…
Read More » -
Ramprakash Ramamoorthy23 February 2024AI’s role in both enabling and defeating emerging forms of fraud
AI has entered every facet of our lives and is changing how people use technologies, from the internet and virtual…
Read More » -
Roman Spitzbart14 February 2024Five AI trends set to change DevOps and security in 2024
Artificial intelligence (AI) has moved rapidly from science fiction to a staple of our daily lives in recent years. While…
Read More » -
Paul Vidic10 January 2024The AI Cybersecurity Arms Race: Fueling Innovation with Strategic Business Funding
In the digital age, the battle lines aren’t drawn on physical maps, but across sprawling networks. The adversaries? Hackers, malware,…
Read More » -
Tuna Gezer21 December 2023Four Reasons to Increase Recoverability of Entra ID Resources
Active Directory (AD) was built for efficient user authentication and access management. However, many legacy on-premises AD environments have risky…
Read More » -
AIJ Guest Post7 December 2023The intersection of AI development and security in 2024
The year 2023 witnessed a transformative surge in the use of artificial intelligence (AI) – particularly generative AI – across…
Read More »