Remove Engineering Remove Security Intelligence Remove Technology
article thumbnail

Artificial Intelligence meets real talk at IRISSCON 2024

BH Consulting

In her enthusiastic talk, Korucu encouraged the 400-strong audience to use the technology, get trained in it, and learn about it – and to realise its shortcomings. “We ESET’s global cybersecurity advisor Jake Moore gave an entertaining and fast-paced look at how criminals can use deepfake technology to create ‘clones’.

article thumbnail

Thales AI Cybersecurity: Using AI, Protecting AI, Protecting Against AI

Thales Cloud Protection & Licensing

Thales AI Cybersecurity: Using AI, Protecting AI, Protecting Against AI madhav Thu, 07/10/2025 - 11:53 The growing threat of AI to cybersecurity and technology resources proved the prevailing topic at RSA this year, alongside the desire to harness its power positively and productively. The question is: will they be able to do it responsibly?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Exabeam positions SIEM technology to help protect IoT, OT systems

The Last Watchdog

Their capacity to ingest threat feeds is becoming more relevant with the rise of IoT (Internet of Things) systems and the vulnerabilities of old and new OT (operational technology). Exabeam is a successful security vendor in the SIEM space. This means that huge amounts of customer information are now digitized and require protection.

IoT 179
article thumbnail

Iran-linked APT groups continue to evolve

Security Affairs

Learn more from this blog summarizing these trends, as presented at #CyberWarCon : [link] — Microsoft Security Intelligence (@MsftSecIntel) November 16, 2021. The analysis focuses on six Iranian hacking groups that are increasingly utilizing ransomware to either fundraise or disrupt the computer networks of the targets.

VPN 134
article thumbnail

SHARED INTEL: FireMon survey shows security lags behind fast pace of hybrid cloud deployments

The Last Watchdog

It doesn’t seem like we’ve moved the needle on security at all,” says Tim Woods, vice president of technology alliances at FireMon, the leading provider of automated network security policy management systems. Meanwhile, UEBA and SOAR technologies, which have come along to boost the horsepower of SIEMs, are advancing.

article thumbnail

Best Identity and Access Management (IAM) Solutions for 2022

eSecurity Planet

The once-great security giant Symantec is now a division of Broadcom. These technologies have become an increasingly important part of access management products. And of course, the work-from-home (WFH) movement has put even greater pressure on access security. A privilege-centric approach to securing identities.

article thumbnail

Staying a Step Ahead of the Hack

Webroot

Hackers, never at a loss for creative deception, have engineered new tactics for exploiting the weakest links in the cybersecurity chain: ourselves! Social engineering and business email compromise (BEC) are two related cyberattack vectors that rely on human error to bypass the technology defenses businesses deploy to deter malware.

Hacking 71