Cybersecurity

A new discipline, machine learning security operations (MLSecOps), has emerged to provide a foundation for robust AI security. Let’s explore five foundational categories within MLSecOps.

Schools and organizations that deploy vast numbers of computers have a much-needed computing edge against cybersecurity risks with enterprise-grade Chromebooks. Consumer-grade Chromebooks come with what Google calls "defense in depth" that provides multiple layers of protection.

This week’s Microsoft Ignite 2024 event in Chicago showcased Microsoft's vision and strategies for corporate and enterprise customers, highlighting AI's potential to transform operations.

Cybersecurity workforce developer NukuDo offers specialized training that leads to guaranteed jobs in computer security, providing a hands-on learning experience and direct employment opportunities.

Deception is critical to the malevolent activity of Black Hat hackers, but, as Microsoft recently showed, it can also be a powerful weapon against those hackers.

These attacks present broader risks that can impact critical infrastructure such as health care systems, autonomous vehicles, financial markets, national security, and military applications.

Cybersecurity experts and government officials have long supported the policy of not paying ransoms due to its potential to curb criminal activity and reduce attacks. Paying ransoms is risky and unreliable and does not guarantee that cybercriminals will restore access or decrypt files.

By offering pre-packed, plug-and-play malware, the MaaS market has enabled even inexperienced attackers to carry out potentially disruptive attacks regardless of their skill level or technical ability.

The US$75 million payment made to the Dark Angels ransomware group was discovered by Zscaler's security research arm ThreatLabz earlier this year.

The rapid rise of AI mimics previous transformative shifts, such as the internet and cloud computing. Just as early cloud adopters navigated new challenges, today's companies must contend with the complexities introduced by widespread AI adoption.

Gartner has released a research note outlining short-term, intermediate, and long-term measures CrowdStrike users can implement to deal with what's become the update from hell.

Security risk management software firm Panorays shed new light on the worsening network security problems workers cause. This internal threat occurs when employees use their organization's network to experiment with generative AI and other AI tools.

Forrester identified top emerging technologies in its latest report, highlighting their potential benefits, use cases, and risks for businesses.

Corporate employers often complain about graduates applying for IT jobs without any hands-on cyber experience. This gap drove officials at Bridgewater State University to create a unique cyber training program to fill that void.

Technewsworld Channels