Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s first AI native,unified Data Security Platform. Yotam Segev, Cyera’s CEO sits down with CyberRisk TV at RSA to discuss Cyera’s skyrocketing growth, its founding stor...
As quantum computing advances, the security foundations of our digital world face unprecedented challenges. This session explores how integrating Public Key Infrastructure (PKI) and Domain Name System (DNS) technologies can fortify digital trust in the quantum era. We'll delve into strategies for transitioning to post-quantum cryptography, ensuring...
Urban One, a U.S. media conglomerate focused on the African American community, has disclosed having its employees' personal data and other corporate information exfiltrated in a "sophisticated social engineering campaign" in February, which was claimed by the Cactus ransomware operation last month, reports The Record, a news site by cybersecurity firm Recorded Future.
Popular e-commerce platform WooCommerce had its users targeted with malware spread via bogus security alerts as part of a far-reaching phishing campaign, Security Affairs reports.
Quantum computing-enabled threat extenuation procedures were only noted by 5% of IT professionals to have been implemented at their organizations, while only 3% regarded such a strategy to be crucial for their businesses, reports Infosecurity Magazine.
As Generative AI becomes integral to business operations, new cybersecurity challenges such as data leakage and prompt injection attacks are emerging. This session highlights why securing Generative AI is critical for organisations and explores how a GenAI firewall mitigates these risks.
LLM security leaderboard: https://www.cloudsine.tech/llm-sec...
Gen AI is being adopted faster than company’s policy and data security can keep up, and as LLM’s become more integrated into company systems and uses leverage more AI enabled applications, they essentially become unintentional data exfiltration points. These tools do not differentiate between what data is sensitive and proprietary and what is not. ...
Fast Five
Selected by the SC Media Editorial team every Tuesday.
Sign up now for the top five issues cybersecurity pros need to know this week.