How secure are your AI and machine learning projects?

How secure are your AI and machine learning projects?

When enterprises adopt new technology, security is often on the back burner. It can seem more important to get new products or services to customers…

View More How secure are your AI and machine learning projects?

As Consumers Shift Online, There Is Greater Need For Cyber Security Services – Inc42 Media

As the lines between digital and physical continue to blur especially amid the Covid-19 pandemic, contactless payments and digital transactions have become the new norm.…

View More As Consumers Shift Online, There Is Greater Need For Cyber Security Services – Inc42 Media

Canadian Centre for Cyber Security warns infrastructure at risk from cyber attacks – Global News

A new report from the Canadian Centre for Cyber Security warns state-sponsored actors are likely developing the ability to launch cyberattacks against the country’s infrastructure…

View More Canadian Centre for Cyber Security warns infrastructure at risk from cyber attacks – Global News

What to Expect: The First Solutions Review Cybersecurity Insight Jam – Solutions Review

What is the Cybersecurity Insight Jam?  The Solutions Review Cybersecurity Insight Jam is an InfoSec community web event taking place on December 9, 2020. Solutions…

View More What to Expect: The First Solutions Review Cybersecurity Insight Jam – Solutions Review
3 SOC Trends Shaping the Future of Security

3 SOC Trends Shaping the Future of Security

It’s easy to suggest that the COVID-19 pandemic has had the greatest impact on any company’s security operations center (SOC) and traditional approaches to cyber-security.…

View More 3 SOC Trends Shaping the Future of Security

Cybersecurity: Why you shouldn’t ignore email security – The Financial Express

One can restrict traffic and prevent several Denial of Service attacks (DoS) by configuring spoof intelligence control in the system. By Shrikant Shitole Over the…

View More Cybersecurity: Why you shouldn’t ignore email security – The Financial Express
A Manufacturer's Ransomware Response: Breakdown of a Break-in

A Manufacturer’s Ransomware Response: Breakdown of a Break-in

The analysis of an industrial ransomware attack reveals common tactics and proactive steps that businesses can take to avoid similar incidents. While no two organizations…

View More A Manufacturer’s Ransomware Response: Breakdown of a Break-in
Tips from a CISO: How to Create a Great Security Program

Tips from a CISO: How to Create a Great Security Program | EC-Council Blog – EC-Council Blog

Authored by Marco Túlio Moraes, Director of Information Security and Privacy, CISO Brasil at Red Ventures Developing a security program sometimes feels like trying to…

View More Tips from a CISO: How to Create a Great Security Program | EC-Council Blog – EC-Council Blog