UK ICO Publishes Guidance on Workplace Monitoring
Listen to this post On October 3, 2023, the UK Information Commissioner’s Office (“ICO”) published new Guidance on lawful monitoring...
Listen to this post On October 3, 2023, the UK Information Commissioner’s Office (“ICO”) published new Guidance on lawful monitoring...
Listen to this post On September 21, 2023, the UK Information Commissioner’s Office (“ICO”) published an opinion on the UK...
Listen to this post On September 21, 2023, UK Secretary of State for Science, Innovation and Technology Michelle Donelan laid...
Listen to this post On September 12, 2023, the UK Information Commissioner, John Edwards, and the Chief Executive of the...
The National Cyber Security Centre provides details on prompt injection and data poisoning attacks so organizations using machine-learning models can...
Image: Whatawin/Adobe Stock A multinational action called Operation “Duck Hunt” — led by the FBI, the Department of Justice, the...
Listen to this post On August 24, 2023, 12 data protection authorities published a joint statement calling for the protection...
The Cisco Talos report exposes new malware used by the group to target Internet backbone infrastructure and healthcare organizations in...
About 2,000 Citrix NetScalers were compromised in automated massive attack campaigns. Find out more about the threat actors and how...
Code development, content creation and analytics are the top generative AI use cases. However, many enterprise users don't trust gen...
Microsoft is working on creating guidelines for red teams making sure generative AI is secure and responsible. Image: putilov_denis/Adobe Stock...
Discover the new shadow IT guidance published by the U.K.'s NCSC. Use this guide to better identify and reduce the...
Assurances include watermarking, reporting about capabilities and risks, investing in safeguards to prevent bias and more. Image: Bill Chizek/Adobe Stock...
While the United Nations hashes out regulations, the UK’s ‘context-based’ approach is intended to spur innovation but may cause uncertainty...
IBM Security also provided tips for how to prevent and mitigate data breaches. Image: Adobe Stock Data breach costs rose...