metadata
Google launches tool to identify AI-generated images
Google is launching a beta version of SynthID, a tool that identifies and watermarks AI-generated images. The tool will initially be available to a limited number of customers …
A comparison of NDR solutions: Deep packet inspection (DPI) vs. metadata analysis
Executive summary In today’s complex IT environments, Network Detection and Response (NDR) solutions are crucial to identify, assess, and respond to cyberthreats. Many NDR …
How to evaluate the security risk of your databases
Data has become one of our most important assets. We usually store data in databases, so knowing how to secure those is of vital importance. This article can help you quantify …
The 3 Rs of visibility for any cloud journey
Dealing with an incident requires not just prompt notification of the incident, but the ability to triage the cause of the incident, the ability to carry out forensics, …
A picture is worth a thousand words, but to hackers, it’s worth much more
Enterprises and end-users are constantly reminded of the dangers associated with clicking on unknown links and documents. Images rarely top the list as would-be …
45 million medical images left exposed online
More than 45 million medical images – including X-rays and CT scans – are left exposed on unprotected servers, a CybelAngel report reveals. The analysts discovered millions of …
41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025
The number of devices connected to the Internet, including the machines, sensors, and cameras that make up the Internet of Things (IoT), continues to grow at a steady pace. A …
Secure comms app Signal now offers encrypted video calls
Users of secure chat and voice call app Signal will soon be able to enjoy the option of encrypted video calls. For the moment, only calls between Signal users who have both …
Metadata: The secret data trail
Every phone call, text message, even activated cell phones, leaves a trail of data across a network. In many cases this data is aggregated with other data and metadata …
New Russian law to force service providers to decrypt encrypted comms
An extremely wide-ranging anti-terrorism law has been passed last week by the lower house of the Russian Federal Assembly (i.e. parliament), and it is widely expected to pass …
Phone metadata can reveal sensitive info about individuals
Since Snowden revealed that the NSA collects from Verizon phone records of US citizens on a daily basis, those who support that kind of collection have been repeatedly …
Featured news
Resources
Don't miss
- Resecurity introduces AI-powered GSOC at NATO Edge 2024
- Windows, macOS users targeted with crypto-and-info-stealing malware
- How to choose secure, verifiable technologies?
- December 2024 Patch Tuesday forecast: The secure future initiative impact
- Building a robust security posture with limited resources