Remove solutions security-engineer
article thumbnail

Black Hat Fireside Chat: How ‘enterprise browsers’ serve as a checkpoint to stop ChatGPT leakage

The Last Watchdog

And despite advances, like sandboxing, browser isolation and secure gateways, the core architecture of web browsers has remained all-too vulnerable to malicious attacks. I visited with Uy Huynh , vice president of solutions engineering at Island.io , to discuss this. I’ll keep watch and keep reporting.

article thumbnail

RSAC Fireside Chat: Secure, flexible web browsers finally available, thanks to open-source code

The Last Watchdog

And this opened the door to a great leap forward in web browser security: enterprise browsers. As RSAC 2024 gets ready to open next week, the practicality of embedding advanced security tools in company-sanctioned web browsers is in the spotlight. I’ll keep watch and keep reporting. I’ll keep watch and keep reporting.

Internet 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Artificial Intelligence: The Evolution of Social Engineering

Security Through Education

In the ever-evolving landscape of cybersecurity, social engineering has undergone significant transformations over the years, propelled by advancements in technology. This article delves into the historical shifts in social engineering tactics and explores how adversaries embrace new technologies to achieve their objectives.

article thumbnail

GUEST ESSAY: Why it’s high time for us to rely primarily on passwordless authentication

The Last Watchdog

Related: Satya Nadella calls for facial recognition regulations Historically, this relationship has been effective from both the user experience and host perspectives; passwords unlocked a world of possibilities, acted as an effective security measure, and were simple to remember. Combining IDs, keys What is the solution, then?

article thumbnail

MY TAKE: Why email security desperately needs retooling in this post-Covid 19, GenAI era

The Last Watchdog

It’s a digital swindle as old as the internet itself, and yet, as the data tells us, the vast majority of security incidents are still rooted in the low-tech art of social engineering. Related: AI makes scam email look real Fresh evidence comes from Mimecast’s “The State of Email and Collaboration Security” 2024 report.

article thumbnail

News Alert: Nile raises $175 million in series C funding to deliver network-as-a-service (NaaS)

The Last Watchdog

After emerging from stealth mode less than a year ago, Nile has built a market-leading network-as-a-service (NaaS) solution designed to deliver a more secure wired and wireless service through the extensive use of monitoring, analytics, and automation. AI is enabling data-driven decision-making to be adopted at a rapid pace.

Wireless 186
article thumbnail

GUEST ESSAY: The case for leveraging hardware to shore up security — via a co-processor

The Last Watchdog

The vulnerabilities of internet security, once mostly a nuisance, have become dangerous and costly. Security software may have been a satisfactory product at the turn of the century, but despite massive levels of investment, many experts now realize that it is not adequate for dealing with contemporary threats.