Popular generative AI projects pose serious security threat
Many popular generative AI projects are an increased security threat and open-source projects that utilize insecure generative AI and LLMs also have poor security posture, …
Businesses count the cost of network downtime
Fewer than one in ten CIOs can claim that they have avoided a network outage, according to Opengear. This finding is among new research by Opengear of both CIOs and network …
Economic volatility drives businesses to MSPs
The current economic conditions are leading companies of all sizes to reassess their operations and business strategies to remain competitive and profitable, according to …
95% fear inadequate cloud security detection and response
Although numerous respondents acknowledged employing risky practices and behaviors within their cloud environments, they strongly believe in the effectiveness of their …
Uncovering attacker tactics through cloud honeypots
Attackers typically find exposed “secrets” – pieces of sensitive information that allow access to an enterprise cloud environment — in as little as two minutes and, in …
Compromised ChatGPT accounts garner rapid dark web popularity
Compromised credentials were found within the logs of info-stealing malware traded on illicit dark web marketplaces over the past year, according to Group-IB. The number of …
US and European IT decision-makers have different cloud security priorities
The growing adoption of cloud has elevated cloud security fear for IT teams, as they grapple with the challenges and concerns arising from the widespread use of complex cloud …
Organizations actively embrace zero trust, integration remains a hurdle
IT teams have made security efforts and progress in zero-trust implementation strategies to establish a new sense of normalcy following the network upheaval caused by the …
Demand for STEM training skyrockets
The rapid pace of globalization, digital transformation, and AI advancements have created a renewed demand for digital and human skills among US learners, according to …
Three cybersecurity actions that make a difference
Organizations that closely align their cybersecurity programs to business objectives are 18% more likely to achieve target revenue growth and market share and improve customer …
Cybercriminals return to business as usual in a post-pandemic world
After two years of pandemic-induced disruption, 2022 was a return to business as usual for the world’s cybercriminals, according to Proofpoint. As COVID-19 medical and …
Cyber debt levels reach tipping point
The tension between difficult economic conditions and the pace of technology innovation, including the evolution of AI, is influencing the growth of identity-led cybersecurity …
Featured news
Sponsored
Don't miss
- Apple’s 45-day certificate proposal: A call to action
- Am I Isolated: Open-source container security benchmark
- A closer look at the 2023-2030 Australian Cyber Security Strategy
- Industrial companies in Europe targeted with GuLoader
- North Korean hackers employ new tactics to compromise crypto-related businesses