Sigma Synthetic Fraud v4 uncovers multiplex synthetic-specific features

Socure has launched Sigma Synthetic Fraud v4. The product uses advanced machine learning and diverse, third-party and network feedback data to uncover patterns linked to insidious synthetic identity fraud.... Read more »

IronCore Labs Cloaked AI protects vector embeddings

IronCore Labs launched Cloaked AI, an SDK that protects vector embeddings with data-in-use encryption. Large language models are shifting the paradigm for how AI products are built and where... Read more »

Why cyber war readiness is critical for democracies

Once the war in Ukraine ends, Russia’s offensive cyber capabilities will be directed towards other targets, Rik Ferguson, VP Security Intelligence for Forescout, predicted at IRISSCON on Thursday. Rik... Read more »

Internal audit leaders are wary of key tech investments

As the digital transformation of business accelerates, risk and internal audit leaders shift their focus to managing technology-driven risk, according to AuditBoard. The report reveals a growing gap between... Read more »

Wireshark 4.2.0 released, open-source packet analysis gets even better

Wireshark, the popular network protocol analyzer, has reached version 4.2.0. Wireshark 4.2.0: Notable changes Wireshark supports dark mode on Windows. Packet list sorting has been improved. Wireshark and TShark... Read more »

New infosec products of the week: November 17, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Devo Technology, Illumio, Kasada, Lacework, OneSpan, and ThreatModeler. OneSpan DIGIPASS FX1 BIO protects against... Read more »

Traditional cloud security isn’t up to the task

In the last year, 47% of all data breaches originated in the cloud, and more than 6 in 10 respondents believe cloud security is lacking and poses a severe... Read more »

AI disinformation campaigns pose major threat to 2024 elections

AI, post-quantum cryptography, zero trust, cryptography research, and election security will shape cybersecurity strategies in the present and for 2024, according to NTT. As the world emerged from the... Read more »

Transforming cybersecurity from reactive to proactive with attack path analysis

An attack path is important to prioritize potential risks in cloud environments. The attack path offers the ability to look at cloud environments from the attacker’s perspective. With today’s... Read more »

ChatGPT’s popularity triggers global generative AI investment surge

While AI is not a new technology – companies have been investing heavily in predictive and interpretive AI for years – the announcement of the GPT-3.5 series from OpenAI... Read more »
Subscribe to our Newsletter