Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

7 Questions Tech Buyers Should Ask About How Their Vendors Use AI

As AI becomes an increasingly critical component in the digital supply chain, tech buyers are struggling to appropriately measure and manage their AI risk. Keeping tabs on emerging risk from the AI technology they use is hard enough. But often the most crucial AI business functions that organizations depend upon aren’t directly under their control or care, but instead are governed by the tech vendors that embed them into their underlying software.

Ensuring Data Privacy in Machine Learning: The Role of Synthetic Data in Protecting PII

In today's data-driven world, machine learning (ML) models rely on vast amounts of information to power insights, automation, and decision-making. However, as organizations increasingly leverage these models, they must also address the critical challenge of protecting personally identifiable information (PII). Regulatory frameworks like GDPR, CCPA, and HIPAA place stringent requirements on how data is collected, processed, and shared, making privacy-preserving techniques essential for responsible AI and ML development.

Guarding open-source AI: Key takeaways from DeepSeek's security breach

In January 2025, within just a week of its global release, DeepSeek faced a wave of sophisticated cyberattacks. Organizations building open-source AI models and platforms are now rethinking their security strategies as they witness the unfolding consequences of DeepSeek’s vulnerabilities. The attack involved well-organized jailbreaking and DDoS assaults, according to security researchers, revealing just how quickly open platforms can be targeted.

Gcore Radar report reveals 56% year-on-year increase in DDoS attacks

Gcore, the global edge AI, cloud, network, and security solutions provider, today announced the findings of its Q3-Q4 2024 Radar report into DDoS attack trends. DDoS attacks have reached unprecedented scale and disruption in 2024, and businesses need to act fast to protect themselves from this evolving threat. The report reveals a significant escalation in the total number of DDoS attacks and their magnitude, measured in terabits per second (Tbps).

A Phased Approach: Thoughts on EU AI Act Readiness

The European Union’s (EU) AI Act (the Act) represents landmark artificial intelligence (AI) regulation from the EU designed to promote trustworthy AI by focusing on the impacts on people through required mitigation of potential risks to health, safety and fundamental rights. The Act introduces a comprehensive and often complex framework for the development, deployment and use of AI systems, impacting a wide range of businesses across the globe.

Cyber and Physical Security Considerations for Returning to the Office

When remote work became mandatory in the wake of the 2020 COVID pandemic, organizations had to quickly dispatch staffers to their homes with all the equipment, and services, they would need to do their jobs. However, as organizations ranging from the US government to JP Morgan Chase to Amazon, have all put out a call for their workers to return to the office, security issues will again become paramount.

Privacy Enhancing Technologies (PETs): Data Protection Meets Innovation

The data protection law does not define PETs; however, The European Union Agency for Cybersecurity (ENISA) refers to PETs as: ‘software and hardware solutions, i.e. systems encompassing technical processes, methods or knowledge to achieve specific privacy or data protection functionality or to protect against risks of privacy of an individual or a group of natural persons.’1 In simple terms, they are strategies and tools designed at safeguarding privacy and empowering individuals.

Comprehensive PowerShell Commenting Guide

If you write Windows PowerShell scripts, it’s important to understand how to use PowerShell comments effectively. This article can help. It explains the key ways you can include comments in your scripts and provides guidance for when to use each method. It also explains popular use cases for comments and offers best practices to follow and common mistakes to avoid.