article thumbnail

We Are Almost 3! Cloud Security Podcast by Google 2023 Reflections

Anton on Security

EP135 AI and Security: The Good, the Bad, and the Magical EP119 RSA 2023 — What We Saw, What We Learned, and What We’re Excited About (well, it was mostly about AI) As a side note, Google Cloud also published SAIF and two exciting papers on AI security and some fun blogs. FUN and GOVERNANCE in the same sentence!). More video!

article thumbnail

Russian Cybersecurity Executive Arrested for Alleged Role in 2012 Megahacks

Krebs on Security

Nikita Kislitsin , formerly the head of network security for one of Russia’s top cybersecurity firms, was arrested last week in Kazakhstan in response to 10-year-old hacking charges from the U.S. A 2010 indictment out of New Jersey accuses Ieremenko and six others with siphoning nonpublic information from the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

We Are Almost 3! Cloud Security Podcast by Google 2023 Reflections

Security Boulevard

EP135 AI and Security: The Good, the Bad, and the Magical EP119 RSA 2023 — What We Saw, What We Learned, and What We’re Excited About (well, it was mostly about AI) As a side note, Google Cloud also published SAIF and two exciting papers on AI security and some fun blogs. FUN and GOVERNANCE in the same sentence!). More video!

article thumbnail

Twitter security under scrutiny after former executive turns whistleblower

Malwarebytes

Provided these accusations are true, the disclosure shows a side of Twitter that poses a threat to its own users' personal information, to company shareholders, to national security, and to democracy. Otherwise known as Mudge, Peiter Zatko is a network security expert, open source programmer, writer, and a hacker.

article thumbnail

Android 14 introduces first-of-its-kind cellular connectivity security features

Google Security

Hardening network security on Android The Android Security Model assumes that all networks are hostile to keep users safe from network packet injection, tampering, or eavesdropping on user traffic. We will also continue to partner with academic institutions to solve complex problems in network security.

Mobile 94
article thumbnail

How to Implement Zero Trust

eSecurity Planet

As organizations look to strengthen their network security or update their cybersecurity defenses, the gospel of zero trust awaits. . With the swift adoption of remote work and added difficulty identifying network perimeters, zero trust as a solution is gaining steam. Also Read: Top Zero Trust Security Solutions of 2021 .

article thumbnail

Zero Trust: Can It Be Implemented Outside the Cloud?

eSecurity Planet

The concept of zero trust has been around since 2010, when Forrester Research analyst John Kindervag created the zero trust security model. government and others, we are still no closer to seeing zero trust architecture widely adopted. Yet two years after the devastating Colonial Pipeline attack and strong advocacy from the U.S.

Insurance 107