Getting Smart With Cybersecurity: AI Can Help the Good Guys, Too
In their 1955 proposal for a summer research project on artificial intelligence (AI), researchers at Dartmouth Conference predicted “…every aspect of learning or any other Read More
In their 1955 proposal for a summer research project on artificial intelligence (AI), researchers at Dartmouth Conference predicted “…every aspect of learning or any other Read More
In a post on its leak site, prolific ransomware threat group LockBit claims that it breached Boeing, and said that it will start releasing sensitive Read More
Try these tricks for devising an education program that gets employees invested — and stays with them after the training is over.
As organizations increasingly move their data and workloads to the cloud, securing cloud identities has become paramount. Identities are the keys to accessing cloud resources, Read More
A high-caliber, enterprise-grade unified endpoint management (UEM) solution is more critical than ever in today’s remote, hybrid, and constantly fluctuating work landscape. If you’re in Read More
Potential budget cuts to the nation’s threat advisor agency would be “catastrophic,” a top Cybersecurity and Infrastructure Security Agency official said Wednesday. During a House Read More
Small and midsize businesses (SMBs) are not immune to cyberattacks, yet they struggle with an evolving threat landscape and knowing how to best manage risk. Read More
As part of “shift left” to incorporate security discussions earlier in the software development life cycle, organizations are beginning to look at threat modeling to Read More
Researchers have developed a side-channel exploit for Apple CPUs, enabling sophisticated attackers to extract sensitive information from browsers. Side-channel attacks are usually overlooked, often physical Read More
BOSTON – Today, the Healey-Driscoll Administration announced a $2.3 million grant through the MassTech Collaborative’s MassCyberCenter to CyberTrust Massachusetts, a nonprofit dedicated to strengthening the cybersecurity ecosystem, to support Read More