Posts in Security

Deepfakes to cost $40 billion by 2027 as adversarial AI gains traction

Deepfakes have emerged as one of the fastest-growing forms of adversarial AI, with projected losses reaching $40 billion by 2027. This marks a significant increase from[…]

Busting Three Data Protection Myths

By: Mohamad Rizk While once upon a time, it may have been an afterthought, data protection is now an everyday priority for businesses. Beyond regulations[…]

turned on flat screen monitor

Building Resilience: Why Disaster Recovery is the Backbone of IT Infrastructure

By: Harikrishna Prabhu Data resilience is a critical element for ensuring the uninterrupted flow of operations. With businesses relying heavily on data for decision-making, customer[…]

olympic symbol landmark

Olympics will Increase Exposure to Cyberthreats

By: Bashar Bashaireh The Paris 2024 Summer Olympic Games gets underway on July 26 this year. Securing the IT architecture of the Olympic Games is[…]

threads by meta on smartphone in hand

Meta’s “Pay or Consent” Model Deemed Unfair by EU Commission

The European Commission has ruled that Meta’s “pay or consent” model violates EU competition rules and data protection principles. The model, which forces users to[…]

BEL signed a contract valued at Rs.3,172 Crs with Armoured Vehicles Nigam Limited

Navratna Defence Public Sector Undertaking, Bharat Electronics Limited (BEL), has bagged an order of Rs.3,172 Crs from Armoured Vehicles Nigam Limited (AVNL) on June 28,[…]

close up view of system hacking

Organizations Struggle with Outdated Security Approaches: Report

Cloudflare, Inc published its State of Application Security 2024 Report. Findings from this year’s report reveal that security teams are struggling to keep pace with[…]

close up view of system hacking

Harnessing Collective Defense with Intelligence Sharing and Continuous Threat Exposure Management

By: Prashant G J As technology advances, cybercriminals continually refine their methods, creating an ever-evolving challenge for security professionals. Traditional cybersecurity measures often fall short,[…]

Understanding the hidden Risk of unsecured usage of GenAI at work as Prompt Security gets seed fund

In the rapidly evolving world of artificial intelligence, generative AI (Genoa) tools have become indispensable for many enterprises, enhancing productivity and streamlining operations. However, a[…]

person using macbook pro on brown wooden table

Spyware found on US hotel check-in computers leaks guest info Online

According to reports, a troubling security breach involving spyware on the check-in systems of several Wyndham hotels across the United States has surfaced. The spyware,[…]