Shadow AI: The silent threat to enterprise data security Dr. Darren Williams February 14, 2025 Just as IT departments have started to get a handle on shadow IT by setting policies for oversight and permissions on the use of applications, a new challenge has emerged — shadow AI.Read More
US declines international AI declaration, security leaders discuss Jordyn Alger February 13, 2025 The United States and the United Kingdom have declined to sign the AI Action Summit agreement. Read More
Will deepfake threats undermine cybersecurity in 2025? Gil Friedrich February 12, 2025 To combat deepfakes, organizations need to implement fresh approaches to both employee education and cybersecurity.Read More
Dangers of DeepSeek’s privacy policy: Data risks in the age of AI Nicky Watson February 11, 2025 As AI technologies rapidly evolve and become more integrated into our daily lives, data privacy concerns have never been more urgent. Read More
DOGE inputs federal data to AI, cyber leaders discuss implications Jordyn Alger February 10, 2025 DOGE has been feeding sensitive federal information into AI. Security leaders discuss. Read More
Lawmakers propose DeepSeek ban on government devices Jordyn Alger February 10, 2025 A bipartisan congressional bill has been proposed, which would prohibit the use of DeepSeek on government devices. Read More
Global News Economic stress was the leading cause of project delays in 2024 Taelor Sutherland February 10, 2025 The 2025 State of Physical Security Report.Read More
DeepSeek-impersonating malware is stealing data, research finds Jordyn Alger February 7, 2025 The emergence of DeepSeek has led to malicious actors attempting to exploit its prominence. Read More
Report finds 1,025% rise in AI vulnerabilities, many tied to APIs Security Staff January 31, 2025 APIs have become a prominent attack surface over the past year. Read More
Why SIEM’s obituary was written too soon Hugh Njemanze January 31, 2025 There are a few fundamental ways SIEM will need to evolve for it to stay relevant and meet today’s cybersecurity challenges. Read More