Tag: Reality
-
New Reality: APTs Boost Sophisticated Cyber Attacks
The BlackEnergy attack was characterized by specially developed modular malware, which took a significant amount of time to develop and …
-
Cyber Risk Governance: The Hype, Hope, and Harsh Reality – John Sapp – CSP #133
Cyber Risk Governance or Cyber Risk Management has been an often talked about concept for more nearly two decades yet remains one of the …
-
Are AI-Engineered Threats FUD or Reality?
The moment that generative AI applications hit the market, it changed the pace of business — not only for security teams, but for …
-
The Bizarre Reality of Getting Online in North Korea
New testimony from defectors reveals pervasive surveillance and monitoring of limited internet connections. For millions of others, the …
-
Reality check: What will generative AI really do for cybersecurity?
Everywhere you look across the cybersecurity industry — on conference stages, trade show floors or in headlines — the biggest companies …
-
Post-Quantum Satellite Protection Rockets Towards Reality
A successful multi-orbit cryptography test beamed quantum-agile data up to two different satellites and back down to …
-
From Disinformation to Deep Fakes: How Threat Actors Manipulate Reality
Deep fakes are expected to become a more prominent attack vector. Here’s how to identify …
-
Spy Cams Reveal the Grim Reality of Slaughterhouse Gas Chambers
Animal rights activists have captured the first hidden-camera video from inside a carbon dioxide “stunning chamber” in a US meatpacking …
-
Secureworks: How To Distinguish Hype From Reality With AI in SecOps
The marketing hyperbole is plenty loud when it comes to artificial intelligence and its subset, machine learning, in the SOC and data …
-
‘Ring Nation’ Is Amazon’s Reality Show for Our Surveillance Dystopia
As Horton goes on to explain, the show was facing controversy for deleting footage of a man who died in police custody, and for deceptively …
-
Distinguishing AI Hype From Reality in SecOps
Artificial intelligence (AI) can be used to enhance the efficiency and scale of SecOps teams, but it will not solve all your cybersecurity …
●●●