Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Webinar Replay - Navigating AI Governance In Retail: Lessons from Real-World Scenarios

As AI continues to innovate the retail industry in areas such as supply chain management, personalizing customer experience and data insights, businesses must navigate the complex challenges of data privacy, secure and compliant AI deployment and ethical use. During this briefing, Kroll experts highlighted the key steps for building a resilient AI Governance program using real-life use cases from the retail industry that will help not only to understand, implement and monitor responsible AI but clear the way for innovation to generate successful return on investment and build consumer trust.

July Release Rollup: Copilot - Improved File Search and Selection, Project Center, and more

We’re excited to share new updates and enhancements for July, including: For more information on these updates and others, please read the complete list below and follow the links for more detailed articles.

When "Private" Isn't: The Security Risks of GPT Chats Leaking to Search Engines

In late July 2025, users discovered that ChatGPT chats, initially shared via link, were appearing in search engine results on platforms such as Google, Bing, and DuckDuckGo. These shared conversations included personal content relating to mental health, career concerns, legal issues, and more, without any indication of a data breach. Instead, the exposure resulted from a now-removed feature that enabled discoverability via search indexing.

The Memcyco FM Show: Episode 10 - Stopping Fake Mobile Apps and Account Takeover (ATO)

Fake apps are the latest evolution of brand impersonation, and they’re proving just as dangerous as phishing sites. Fraudsters clone legitimate mobile apps, publish them on official app stores, and trick users into entering credentials — which are then reused in the real app before anyone notices. Given that over 60% of web traffic is now mobile, this form of phishing-driven credential reuse has become one of the top blind spots in mobile fraud defense. Yet most mobile security tools can’t detect it — because they don’t know where those credentials came from.

Cruzo by Barantech: The Future of Smart Boat Control

From fishing vessels and luxury yachts to commercial ferries and patrol boats, the world of marine navigation is undergoing a digital transformation. In an age where smart homes and connected cars are becoming the norm, it's no surprise that marine technology is catching up-and in some cases, even leading the way.

How Lockfinity Is Transforming Storage Unit Security

Storage units have become an essential part of modern life. Whether you're moving, downsizing, managing business inventory, or simply decluttering, the demand for secure and reliable storage continues to grow. But there's one thing that hasn't evolved nearly fast enough-the locks that protect our belongings.

The Rise of Touch Metal Interfaces in Harsh Environments

When it comes to technology used in demanding conditions-think factories, outdoor kiosks, marine control panels, and medical equipment-there's one requirement that always tops the list: durability. Traditional mechanical switches and buttons often fall short in environments filled with moisture, dust, vibrations, and heavy use. That's where a new class of rugged input technology is gaining traction: touch metal piezo switches.

The Microservices Advantage: Building Resilient and Agile SaaS Applications

In today's fast-paced digital environment, businesses need software solutions that are adaptable, scalable, and resilient. For SaaS (Software as a Service) applications, the architecture behind the product plays a crucial role in delivering these qualities. One approach that has gained significant traction is the microservices architecture - a method that structures an application as a collection of loosely coupled, independently deployable services.