Research Eyes Misconfiguration Issues At Google, Amazon and Microsoft Cloud

Qualys report looks at how misconfiguration issues on cloud service providers help attackers gain access. Read more »

ChatGPT Security Concerns: Credentials on the Dark Web and More

ChatGPT-related security risks also include writing malicious code and amplifying disinformation. Read about a new tool advertised on the Dark Web called WormGPT. Read more »

How an 8-character password could be cracked in just a few minutes

Advances in graphics processing technology and AI have slashed the time needed to crack a password using brute force techniques, says Hive Systems. Read more »

UK’s NCSC Publishes New Shadow IT Guidance

Discover the new shadow IT guidance published by the U.K.’s NCSC. Use this guide to better identify and reduce the levels of shadow IT within your organization. Read more »

8 Best Identity and Access Management (IAM) Solutions for 2023

Identity and access management software helps you maintain control of your environment by allowing authorized users to access company resources. Learn 10 of the top IAM tools to see... Read more »

Could C2PA Cryptography be the Key to Fighting AI-Driven Misinformation?

Adobe, Arm, Intel, Microsoft and Truepic put their weight behind C2PA, an alternative to watermarking AI-generated content. Read more »

Cybersecurity: How Can Companies Benefit From FBI and Homeland Security Collaboration?

Agents of the FBI and Homeland Security at the Northeast Cybersecurity Summit revealed how cyberintelligence collaboration works. Learn more with our article. Read more »

Companies Should Implement ROI-Driven Cybersecurity Budgets, Expert Says

Discover the new models used to assign security budgets that succeed where traditional and outdated processes fail. Read more »

Arc Browser Review (2023): Pricing, Features, Alternatives and More

Learn about Arc’s features, pros and cons, and what makes the web browser unique. Arc is available only for Mac and iPhone users. Read more »

Cisco announces general availability of XDR platform

In alliance with Cohesity and others, Cisco is fueling near-zero latency between ransomware detection and remediation with its Extended Detection and Response platform. Read more »
Subscribe to our Newsletter