Insights
4 lessons healthcare can teach us about successful applications of AI
In order to get the most out of a chatbot and meet regulatory requirements, healthcare users must find solutions that enable them to shift noisy...
White House requires agencies to create AI safeguards, appoint CAIOs
AI’s impact on public safety The policy defines several uses of AI that could impact public safety and human rights, and it requires agencies to...
Robust remote access security for the utilities sector advances with Zero Trust
Cyberattacks on utilities more than doubled from 2020 to 2022. It’s likely the case that the rapid growth of connected assets is outstripping security capabilities....
If you get an unexpected call from Apple Support, you’re being hacked
Have you ever had an unexpected direct phone call from Apple support? I have not, and if you do ever receive one, you probably aren’t...
NetSuite adds more Text Enhance gen AI capabilities
In the supply chain domain, Text Enhance can now help enterprise teams create support tickets for warehouse management issues and shipment summaries that describe the...
7 tips for leading without authority
1. Create a shared vision Rob Rogers is a data scientist and the CEO of Oii.ai, an AI company that automates supply chain design. He...
Trending News
AceCryptor attacks surge in Europe – Week in security with Tony Anscombe
Video The second half of 2023 saw massive growth in AceCryptor-packed malware spreading in the wild, including courtesy of multiple spam campaigns where AceCryptor packed...
A prescription for privacy protection: Exercise caution when using a mobile health app
Privacy Given the unhealthy data-collection habits of some mHealth apps, you’re well advised to tread carefully when choosing with whom you share some of your...
Healthcare still a prime target for cybercrime gangs – Week in security with Tony Anscombe
Video Healthcare organizations remain firmly in attackers' crosshairs, representing 20 percent of all victims of ransomware attacks among critical infrastructure entities in the US in...
Threat intelligence explained |Unlocked 403: A cybersecurity podcast
Video We break down the fundamentals of threat intelligence and its role in anticipating and countering emerging threats Alžbeta Kovaľová 14 Mar 2024 The threat...
How to share large or sensitive files securely online
How To Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains...
APT attacks taking aim at Tibetans – Week in security with Tony Anscombe
Video Evasive Panda has been spotted targeting Tibetans in several countries and territories with payloads that included a previously undocumented backdoor ESET has named Nightdoor...