Remove Presentation Remove Security Intelligence Remove Technology
article thumbnail

Artificial Intelligence meets real talk at IRISSCON 2024

BH Consulting

The result, as ever, was presentations strong on realism and common sense, short on sales hype and scaremongering. In her enthusiastic talk, Korucu encouraged the 400-strong audience to use the technology, get trained in it, and learn about it – and to realise its shortcomings. “We We overestimate AI,” she said. Drowning in data?

article thumbnail

Thales AI Cybersecurity: Using AI, Protecting AI, Protecting Against AI

Thales Cloud Protection & Licensing

Thales AI Cybersecurity: Using AI, Protecting AI, Protecting Against AI madhav Thu, 07/10/2025 - 11:53 The growing threat of AI to cybersecurity and technology resources proved the prevailing topic at RSA this year, alongside the desire to harness its power positively and productively. The question is: will they be able to do it responsibly?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Iran-linked APT groups continue to evolve

Security Affairs

Over the past year, Microsoft Threat Intelligence Center (MSTIC) has observed an evolution of the tools, techniques, and procedures employed by Iranian nation-state actors. Learn more from this blog summarizing these trends, as presented at #CyberWarCon : [link] — Microsoft Security Intelligence (@MsftSecIntel) November 16, 2021.

VPN 134
article thumbnail

RevengeRAT and AysncRAT target aerospace and travel sectors

SC Magazine

Microsoft Security Intelligence earlier this week tweeted out that it has been tracking a campaign of remote access trojans (RATs) targeting the aerospace and travel industries with spear-phishing emails that distribute an actively developed loader, which then delivers RevengeRAT or AysncRAT. Photo by Joe Raedle/Getty Images).

Phishing 126
article thumbnail

What does it take to do SASE your way?

Cisco Security

And it must do so securely. This strategy is known as Secure Access Service Edge, aka SASE (pronounced “sassy”). On a basic level, SASE involves the convergence of networking and security technologies to be delivered together via the cloud – ideally from a single vendor. Why is a single solution important?

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Also read : Addressing Remote Desktop Attacks and Security. Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black.

article thumbnail

More Than 90 Percent of Malware in Q2 Came Via Encrypted Traffic: WatchGuard

eSecurity Planet

percent of all malware detected on networks of WatchGuard Technologies customers in the second quarter came over encrypted connections, raising the security risk for the 80 percent of such organizations that lack processes for decrypting and scanning HTTPS traffic for threats. A surprising 91.5