How to Spot AI Audio Deepfakes at Election Time
We’ve said it several times in our blogs — it’s tough knowing what’s real and what’s fake out there. And...
We’ve said it several times in our blogs — it’s tough knowing what’s real and what’s fake out there. And...
Imagine receiving a call from a loved one, only to discover it’s not them but a convincing replica created by...
It’s Wednesday night. You’re fast asleep aboard the USS Enterprise Star Trek. Suddenly, you wake to an urgent announcement and...
It’s one thing to claim leadership in cloud security; it’s another to have that leadership acknowledged by industry experts. That’s...
It’s that time of year again – tax season! Whether you’ve already filed in the hopes of an early refund...
Apr 03, 2024NewsroomBrowser Security / Session Hijacking Google on Tuesday said it's piloting a new feature in Chrome called Device...
Brute force attacks illustrate how persistence can pay off. Unfortunately, in this context, it’s for bad actors. Let’s dive into...
Because it’s so difficult to get the right genAI talent in the enterprise, startups who offer tooling to make it...
It’s time to get those W-2 and 1099 tax forms ready. On January 29th, the IRS began accepting paper and...
Cyberattacks on utilities more than doubled from 2020 to 2022. It’s likely the case that the rapid growth of connected...
It’s yet another hardware side-channel attack: The threat resides in the chips’ data memory-dependent prefetcher, a hardware optimization that predicts...
“It’s a hard problem, but I think we can fix it,” he wrote, hinting that he has a plan by...
Google Pays $10M in Bug Bounties in 2023 BleepingComputer has the details. It’s $2M less than in 2022, but it’s...
What’s the difference between identity fraud and identity theft? Well, it’s subtle, so much so that it’s easy to use...
This mini-essay was my contribution to a round table on Power and Governance in the Age of AI. It’s nothing...