An enterprise browser startup led by former Symantec President and COO Mike Fey closed its Series C round to accelerate market penetration and revenue growth. The company said the $100 million investment led by Prysm Capital will make it easier for companies to secure bring your own device.
ISMG recently concluded its Virtual Cybersecurity Summit: Africa, where cybersecurity leaders from across the globe came together to explore diverse security trends and challenges in the region, including the need for a collaborative defense strategy to counteract the changing threat landscape.
Generative AI facilitates on-the-job learning, empowering team members to upskill themselves as they work and ultimately strengthening an organization's overall security posture, according to Fabio Fratucello, field chief technology officer, international, at CrowdStrike.
Threat actors are exploiting another zero-day flaw in Cisco's IOS XE software to implant a malicious backdoor. The IOS XE operating system runs on a wide range of Cisco networking devices, including routers, switches, wireless controllers, access points and more.
The British government's ambitions to turn the United Kingdom into a global leader in artificial intelligence are "unrealistic," warn researchers from the University of Cambridge. Experts say legal hurdles and lack of economic incentive pose major challenges.
Techno-optimistic New York City Mayor Eric Adams on Monday unveiled a plan he said can convert the notoriously bureaucratic city administration into an AI powerhouse. AI presents a "once-in-a-generation opportunity" to improve city services, the Democratic mayor said.
In the latest weekly update, editors at Information Security Media Group discuss the impact of the Israel-Hamas war on the threat landscape and the workforce, the role of the U.S. in shaping the future of AI technology, and highlights from ISMG's Financial Services Summit in New York.
Since deception technology provides early warning of potential attacks by tricking hackers into accessing fake information, can AI tools such as ChatGPT be used to create more convincing lures? That's a question Xavier Bellekens, CEO of Lupovis, put to the test - with promising results.
The Clop ransomware operation's recent mass zero-day exploit of Progress Software's MOVEit secure managed file transfer software followed the criminals launching similar attacks against users of Accellion FTA, SolarWinds Serv-U and Fortra GoAnywhere.
This week, Chainalysis busted crypto terrorist financing myths, the Sam Bankman-Fried trial continued, Stars Arena got back 90% of its stolen funds, an EU authority warned about DeFi risks, the U.S. FDIC said it would focus more on crypto, and California's governor approved crypto regulations.
The data leak and negotiation sites for the Ragnar Locker ransomware group went offline Thursday after an international law enforcement operation, backed by the FBI and police in Europe, seized its infrastructure. Whether the disruption spells the end for Ragnar Locker remains unclear.
North Korean nation-state threat actors are exploiting a critical remote code execution vulnerability affecting multiple versions of a DevSecOps tool - a high-risk development, especially in light of Pyongyang hackers' recent track record of supply chain hacks.
The U.S. needs to pass federal legislation to establish a national framework of standards and a rules of the road for AI, but first passing federal data privacy legislation is an essential foundational part of that, some witnesses told members of Congress.
Arctic Wolf last week announced plans to buy SOAR platform provider Revelstoke in a move to boost Arctic Wolf's automated response capabilities and lay the groundwork for "deeply embedded" AI and machine learning. CEO Nick Schneider explained how the deal will benefit customers and drive innovation.
The biggest challenges in threat detection and response today are the inability to cover the entire attack surface and a lack of insight into who is attacking and why. To address these issues, Cisco introduced Breach Protection, a suite of products that combines email, endpoint and XDR protection.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.