Special Report: Social Engineering and the MGM Grand
In our Special Report, we dig into how social engineering works – and use the MGM breach as an example.
Read more...In our Special Report, we dig into how social engineering works – and use the MGM breach as an example.
Read more...The MGM Grand/Caesar’s breach is the most exhaustively covered cyber event in recent memory. Even the attackers published detailed explanations of how they did it. There was, however, one question still needs answering:
Read more...With the convenience of online collaboration comes the responsibility to ensure the security of sensitive information – first and foremost when it comes to something as basic as filesharing
Read more...When it comes to generative artificial intelligence, the genie is out of the bottle. This has increased the urgency for guidance, training, and education.
Read more...In the immortal words of Ferris Buller, “life moves pretty fast.” So does Cybersecurity. A recently published guide from OCEG will help you navigate this landscape.
Read more...We’ve had the chance to interview Andy Grolnick, CEO of Graylog, and asked a few questions about API security, AI and the cybersecurity market consolidation.
Read more...Insider threats are more commonplace than one would expect. But what can be done to prevent them? Zero Trust is one answer – so we spoke to several industry experts to learn what they have to say on the topic.
Read more...The rise of generative AI products for commercial use is probably the fastest and most controversial of any technological advancemore
Read more...There is a growing concern that the increasing use of AI could create a tipping point where the technology grows and permeates our personal lives and businesses rapidly, building upon itself while cyber protections are still catching up.
Read more...SAP is no stranger to harnessing the power of AI. But what does AI mean for SAP Security?
Read more...