Please turn on your JavaScript for this page to function normally.
Google DeepMind
Google launches tool to identify AI-generated images

Google is launching a beta version of SynthID, a tool that identifies and watermarks AI-generated images. The tool will initially be available to a limited number of customers …

NDR
A comparison of NDR solutions: Deep packet inspection (DPI) vs. metadata analysis

Executive summary In today’s complex IT environments, Network Detection and Response (NDR) solutions are crucial to identify, assess, and respond to cyberthreats. Many NDR …

Data
How to evaluate the security risk of your databases

Data has become one of our most important assets. We usually store data in databases, so knowing how to secure those is of vital importance. This article can help you quantify …

cloud complexity
The 3 Rs of visibility for any cloud journey

Dealing with an incident requires not just prompt notification of the incident, but the ability to triage the cause of the incident, the ability to carry out forensics, …

idea
A picture is worth a thousand words, but to hackers, it’s worth much more

Enterprises and end-users are constantly reminded of the dangers associated with clicking on unknown links and documents. Images rarely top the list as would-be …

medical devices
45 million medical images left exposed online

More than 45 million medical images – including X-rays and CT scans – are left exposed on unprotected servers, a CybelAngel report reveals. The analysts discovered millions of …

road
41.6 billion IoT devices will be generating 79.4 zettabytes of data in 2025

The number of devices connected to the Internet, including the machines, sensors, and cameras that make up the Internet of Things (IoT), continues to grow at a steady pace. A …

signal app icons
Secure comms app Signal now offers encrypted video calls

Users of secure chat and voice call app Signal will soon be able to enjoy the option of encrypted video calls. For the moment, only calls between Signal users who have both …

data
Metadata: The secret data trail

Every phone call, text message, even activated cell phones, leaves a trail of data across a network. In many cases this data is aggregated with other data and metadata …

facepalm
New Russian law to force service providers to decrypt encrypted comms

An extremely wide-ranging anti-terrorism law has been passed last week by the lower house of the Russian Federal Assembly (i.e. parliament), and it is widely expected to pass …

Phone
Phone metadata can reveal sensitive info about individuals

Since Snowden revealed that the NSA collects from Verizon phone records of US citizens on a daily basis, those who support that kind of collection have been repeatedly …

Don't miss

Cybersecurity news