Zephyrnet Logo

Tag: security controls

Apple Intelligence Could Introduce Device Security Risks

Apple's long-awaited announcement of its generative AI (GenAI) capabilities came with an in-depth discussion of the company's security considerations for the platform. But the...

Top News

Top 10 Cybersecurity Threats Facing Businesses Today

Cybersecurity threats are evolving at an alarming pace, making it crucial for...

Concentric AI to Unveil Data Security Remediation, Compliance Reporting at Infosecurity Europe 2024

PRESS RELEASESAN MATEO, Calif., May 23, 2024 — Concentric AI, a leading vendor of intelligent AI-based solutions for autonomous data security posture management (DSPM), announced today it will...

Technology Audit Processes Are Broken, but Attention and Automation Can Fix Them – DATAVERSITY

Technology audit processes have become increasingly important, as they tie directly to adherence to an ever-growing list of compliance frameworks and mandates such as...

What is ATM jackpotting? | Definition from TechTarget

What is ATM jackpotting? ATM jackpotting is the exploitation of physical and software vulnerabilities in automated banking machines that result in the machines dispensing cash....

CISO Corner: What Cyber Labor Shortage?; SEC Deadlines

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

Why Tokens Are Like Gold for Opportunistic Threat Actors

COMMENTARYAuthentication tokens aren't actual physical tokens, of course. But when these digital identifiers aren't expired regularly or pinned for use by a specific device...

Three strategies for winning the cybersecurity arms race

As cybersecurity attacks against financial institutions continue to escalate, banks and other financial organizations must take proactive measures to protect themselves and their data....

CISO Corner: Verizon DBIR Lessons; Workplace Microaggression; Shadow APIs

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

New Research Suggests Africa Is Being Used As a ‘Testing Ground’ for Nation State Cyber Warfare

PRESS RELEASELondon, UK. 24th April 2024: Performanta, the multinational cybersecurity firm specialising in helping companies move beyond security to achieve cyber safety, has uncovered a trend...

5 Hard Truths About the State of Cloud Security 2024

While cloud security has certainly come a long way since the wild west days of early cloud adoption, the truth is that there's a...

CISO Corner: Breaking Staff Burnout, GPT-4 Exploits, Rebalancing NIST

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

How Kraken Wallet addresses challenges in mobile crypto security

We believe that the most secure mobile crypto wallet is one that overcomes the inherent constraints of its mobile operating system. For instance, on...

Latest Intelligence

spot_img
spot_img