The convergence of blockchain technology and artificial intelligence (AI) has the potential to revolutionize various industries, creating new opportunities and transforming existing processes. This powerful amalgamation offers a host of benefits, including enhanced security, increased transparency, and improved efficiency. By harnessing the capabilities of blockchain and AI, innovative applications can emerge, paving the way for a future marked by decentralized and intelligent systems. Here we delve into the promising possibilities that arise from the fusion of these transformative technologies.Continue reading
The growing threat: AI-driven malware poses serious challenges to cybersecurity
In recent years, the proliferation of artificial intelligence (AI) has revolutionized various industries, empowering them with unprecedented capabilities and efficiency. Unfortunately, just as legitimate industries harness AI for beneficial purposes, the realm of cybercrime has also recognized its potential. Malware developers are now incorporating AI into their malicious creations, resulting in a new breed of threats that possess enhanced evasion techniques and adaptability. This article explores the dangers associated with the marriage of AI and malware, shedding light on the imminent challenges it presents to cybersecurity professionals.Continue reading
Russian aggression – this is what’s coming next
For some, it occurred when Russian tanks crossed the Ukrainian border after assurances that they were merely conducting training maneuvers. For some it occurred when Russian military deliberately targeted civilians. For some it was the shelling of a maternity hospital or a Mariupol theatre with дети displayed outside. For some it was the false flag setup for chemical weapon attack or the reckless shelling of nuclear facilities. Putin has crossed his Rubicon.
Deepfake – fake news on steriods
Using Photoshop to alter images to make the subject look thinner, healthier or more attractive, has become so endemic that the word has entered the lexicon as a verb, adjective and noun. Advancements in AI, specifically deep learning using artificial neural networks, have taken this activity to a potentially more harmful level. Last season’s liposuction of bimbo belly fat has become this season’s complete head transplants of politicians and celebrities. Continue reading
What does the ‘hybrid workplace’ mean for cyber security?
The hybrid workplace is becoming the new buzzword as companies look towards the coming months. Enabling employees to work some of the time remotely, and some of the time in the office seems like a sensible approach. But while it minimises Covid risks, the question we should be asking, is whether it might expose organisations to greater risks from cyberattacks. Continue reading
New Year, Heightened Cyber Risks
For all of us the idea that we close 2020 and start 2021 afresh is appealing. But it will not happen. The impact of Covid-19 will reach into the New Year, even as we pin our hopes on a vaccine. And in the cybersecurity world, we are now preparing for an onslaught of new and inventive attacks that prey on these hopes and bring further challenges for individuals and for companies. Continue reading
Manage endpoints to protect the weakest link in the security chain
What do we understand by endpoints? Traditionally, an endpoint was any device connected to the LAN or WAN such as a workstation or end-user PC, a modem, a hub or a switch. Now endpoints incorporate a multitude of additional digital devices from laptops, tablets and mobile phones sitting on the edge of the network, to network printers, consumer and industrial IoT devices and point-of-sale systems. Securing this ever-expanding portfolio has become urgent because these devices represent a significant risk to the cloud ecosystem and the global enterprises that are on or moving towards it.
Equipping remote call centre agents to protect customer data
The challenge for call centres over recent months has been how to balance the safety of employees and support them working remotely, with a lack of access to secure systems that could connect them to customer files, policy documents, and payment processes.
Financial Services data is at risk from attacks on unprotected endpoints
The past month has seen some organisations asking their employees to return to work while others are encouraging teams to stay at home and continue to work remotely. Continue reading
Protect the chain as data flows from the keystroke to the cloud
Data is at risk from the second that a key is pressed on an endpoint to the point when it reaches the corporate cloud and is stored. In fact, the most vulnerable point in the entire process is at the very beginning when the user presses a key, and this is where protection needs to be prioritised.