AI for security is here. Now we need security for AI
As the mass adoption and application of AI are fairly new, the security of AI is not yet well understood. Why we must change that — now. As the mass adoption and application of AI are fairly new, the security of AI is not yet well understood. W.....»»
Suricata: Open-source network analysis and threat detection
Suricata is an open-source network intrusion detection system (IDS), intrusion prevention system (IPS), and network security monitoring engine. Suricata features Suricata offers comprehensive capabilities for network security monitoring (NSM), includ.....»»
Enhancing firewall management with automation tools
In this Help Net Security interview, Raymond Brancato, CEO at Tufin, discusses the considerations organizations must weigh when selecting a next-generation firewall to effectively balance security needs with network performance. What factors should o.....»»
T-Mobile pays $16 million fine for three years’ worth of data breaches
Breaches in three consecutive years lead to $16M fine and new security protocols. Enlarge (credit: Getty Images | SOPA Images ) T-Mobile has agreed to pay a $15.75 million fine and improve its security in a settlement ov.....»»
AI digests repetitive scatological document into profound “poop” podcast
What happens when you ask an AI model to summarize a bunch of crap? Enlarge / This AI prompt stinks... or does it? (credit: Aurich Lawson) Imagine you're a podcaster who regularly does quick 10- to 12-minute summary revi.....»»
AI model detects impervious surfaces in aerial images
In accordance with the German Sustainability Strategy, new impervious surfaces are to be limited to less than 30 hectares per day nationwide. In order to verify whether this target is met, it must be possible to monitor soil sealing at regular interv.....»»
Q&A: UN security council needs major changes—permanent seats for African countries is just one
Recently, the US ambassador to the United Nations announced America's support for the creation of two new permanent UN security council seats for African states. Gary Wilson, a scholar of international law and relations—specifically issues related.....»»
Q&A: Extreme weather is disrupting lives in southern Africa—new policies are needed to keep the peace
Over the past decades, heavy and more frequent rainfall and dry spells in southern Africa have caused loss and damage to agriculture, livestock, the energy sector, food security and nutrition......»»
Westinghouse’s new nuclear microreactor could power tomorrow’s AI data centers
Westinghouse is building 5 MW nuclear reactors for AI data centers that can run for nearly a decade without refueling......»»
Use Windows event logs for ransomware investigations, JPCERT/CC advises
The JPCERT Coordination Center – the first Computer Security Incident Response Team established in Japan – has compiled a list of entries in Windows event logs that could help enterprise defenders respond to human-operated ransomware atta.....»»
ConnectSecure unveils M365 Assessment Module to help MSPs identify security weaknesses
ConnectSecure launched its new Microsoft 365 (M365) Assessment module. The solution empowers MSPs with greater visibility into Microsoft 365 configurations, offering real-time monitoring of changes and improving security controls. As the most widely.....»»
Dragos acquires Network Perception to boost security in OT environments
Dragos announced the acquisition of Network Perception, makers of NP-View, a network visualization platform for OT networks. The acquisition will bolster the Dragos Platform with industry-leading OT network visibility along with compliance and segmen.....»»
RSA and Swissbit join forces to secure government agencies
RSA and Swissbit announced that RSA will start introducing its next-generation hardware authenticators RSA iShield Key 2 series powered by Swissbit alongside RSA ID Plus for Government. Built to meet the highest security standards, the RSA iShield Ke.....»»
Red Sift Radar diagnoses issues through AI-powered insights
Red Sift launched Red Sift Radar, the upskilled LLM assistant that identifies and diagnoses misconfigurations and exposures across email, domains, and internet-facing assets, supporting security teams to prevent incidents before they happen. Maliciou.....»»
Exabeam introduces AI-driven LogRhythm Intelligence
Exabeam announced its first quarterly product release since merging with LogRhythm. The latest innovations provide global customers with increased flexibility to choose the security solutions that best meet their specific needs based on infrastructur.....»»
A Tesla camera in Ohio captures heist as police discover a new crime-fighting tool
A Tesla owner in Toledo, Ohio, shared video footage of thieves stealing his brother's SUV, helping police recover the vehicle and make an arrest. Tesla external security cameras are assisting with similar crimes nationwide......»»
Apple Intelligence release date — here’s when all the AI features are coming
Apple Intelligence release date — here’s when all the AI features are coming.....»»
OWG Parallax Private Cloud Desktop simplifies business operations
OWG unveiled Parallax Private Cloud Desktop to provide businesses with IT solutions that ensure efficiency, security, and scalability. This next-generation cloud platform is engineered to meet the most stringent security protocols, empowering busines.....»»
Password management habits you should unlearn
Despite advancements in security technology, many individuals and organizations continue to rely on outdated and vulnerable authentication methods, leaving themselves exposed to cyber threats. This ongoing reliance on insecure methods has led to a st.....»»
Reducing credential complexity with identity federation
In this Help Net Security interview, Omer Cohen, Chief Security Officer at Descope, discusses the impact of identity federation on organizational security and user experience. He explains how this approach streamlines credential management and enhanc.....»»
3 easy microsegmentation projects
Like many large-scale network security projects, microsegmentation can seem complex, time-consuming, and expensive. It involves managing intricate details about inter-device service connectivity. One web server should connect to specific databases bu.....»»