Preparing for the Future: Understanding Identity’s Role in Data Security
By Gal Helemski, Co-Founder and CTO/CPO at PlainID “Data is the lifeblood of an organization.” Becoming somewhat of a platitude in the security space, it’s…
By Gal Helemski, Co-Founder and CTO/CPO at PlainID “Data is the lifeblood of an organization.” Becoming somewhat of a platitude in the security space, it’s…
In a concerning turn of events, the servers of Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) fell victim to a cyberattack…
In a digital age where the lines between activism and hacking are increasingly blurred, Anonymous Sudan, a self-proclaimed hacktivist group with ties to the Russian…
In the contemporary digital environment, the specter of cyberattacks casts a shadow over organizations of every scale. Despite the essential role that cyber resilience plays…
By David Hoelzer, Fellow at The SANS Institute The rise of ChatGPT and generative AI has ushered in an extensive range of new opportunities seemingly…
Pieter Adieux Co-Founder and CEO, Secure Code Warrior The possibilities of generative AI (GAI) technology have had both developers and non-developers wide-eyed with excitement, particularly…
[ This article was originally published here ] The content of this post is solely the responsibility of the author. AT&T does not adopt or…
The historical Municipality of Montreal, situated in Canada, has fallen victim to the LockBit Ransomware, an event that underscores the increasing menace of cyber threats.…
Approximately 3 to 4 years ago, Dr. Johnny Ryan, a senior member of the Irish Council of Civil Liberties (ICCL), initiated a legal case against…
China has reportedly focused its efforts on compromising email servers within several American government networks, raising concerns about potential data exploitation. According to findings from…
Jaye Tillson, Field CTO at Axis Security Amidst the ever-evolving terrain of modern information technology, the domain of higher education has emerged as a focal…
[ This article was originally published here ] The content of this post is solely the responsibility of the author. AT&T does not adopt or…