About 2,000 Citrix NetScalers were compromised in automated massive attack campaigns. Find out more about the threat actors and how...more


About 2,000 Citrix NetScalers were compromised in automated massive attack campaigns. Find out more about the threat actors and how...more

Code development, content creation and analytics are the top generative AI use cases. However, many enterprise users don't trust gen...more

Microsoft is working on creating guidelines for red teams making sure generative AI is secure and responsible. Image: putilov_denis/Adobe Stock...more

Discover the new shadow IT guidance published by the U.K.'s NCSC. Use this guide to better identify and reduce the...more

Discover new generative AI and machine learning products and services from AWS at AWS Summit New York 2023. Swami Sivasubramanian,...more

The computing space first announced in March is now open for general availability. The same type of hardware underpinned ChatGPT....more

Assurances include watermarking, reporting about capabilities and risks, investing in safeguards to prevent bias and more. Image: Bill Chizek/Adobe Stock...more

While the United Nations hashes out regulations, the UK’s ‘context-based’ approach is intended to spur innovation but may cause uncertainty...more

IBM Security also provided tips for how to prevent and mitigate data breaches. Image: Adobe Stock Data breach costs rose...more

Image: SomYuZu/Adobe Stock The Europol report reported on cybercriminals’ use of cryptocurrencies and how their techniques are more sophisticated. However,...more