The Looming Shadow Over AI: Securing the Future of Large Language Models

The Looming Shadow Over AI: Securing the Future of Large Language Models

These days Large Language Models (LLMs) are nothing short of revolutionary, though they have been around since 1996 (ELIZA, developed by Joseph Weizenbaum, simulating a psychotherapist in conversation). It always astounds people how these neural network-powered marvels can understand and generate human language with astonishing fluency, opening doors to incredible possibilities. But this power comes at a price. I believe we’re facing a critical juncture: unless we address the security risks head-on, the potential of…

Read More

Rising to the challenge of new data security standards

Rising to the challenge of new data security standards

With the rate of security vulnerabilities doubling every seven years and coming off one of the largest known infrastructure attacks (Salt Typhoon), modern security at speed and cost is non-negotiable for securing financial transactions. To ensure the safety of cardholder environments, financial institutions must understand the guidance on modern technologies and applicable controls. Late last year, the Payment Card Industry Standards Security Council (PCI SSC) published an information supplement that can help companies and auditors…

Read More

Hertz Data Breach Exposes Customer Information in Cleo Zero-Day Attack

Hertz Data Breach Exposes Customer Information in Cleo Zero-Day Attack

Hertz Corporation has confirmed a data breach that exposed sensitive customer data after attackers exploited a zero-day vulnerability in file transfer software provided by Cleo Communications. The breach affected the Hertz, Thrifty and Dollar brands and occurred in October and December 2024. It was disclosed on February 10 2025. The exposed data includes: Names Contact information Dates of birth Credit card details Driver’s license numbers Workers’ compensation claim data In a smaller number of cases,…

Read More

How Partners Can Accelerate Growth with Cisco and Splunk

How Partners Can Accelerate Growth with Cisco and Splunk

It’s been just over a year since Cisco and Splunk joined forces, and the vision behind this acquisition remains stronger than ever:  We will bring the full power of the network, together with market-leading security and observability solutions, to deliver a real-time unified view of the entire digital landscape, helping teams proactively defend critical infrastructure, prevent outages, and refine the network experience. Today, over 1,000 organizations are joint partners of Cisco and Splunk—and that number…

Read More

A Milestone for Cisco SMB: The Inaugural EMEA SMB Partner Advisory Board

A Milestone for Cisco SMB: The Inaugural EMEA SMB Partner Advisory Board

Last week, we marked an important milestone in our SMB journey with the first-ever EMEA SMB Partner Advisory Board-a dynamic and insightful gathering of 51 partners who joined us for two days of deep discussions, strategy alignment, and collaborative workshops. A Powerful Start We kicked off with an inspiring keynote where José van Dijk emphasized the critical role SMBs play in Cisco’s strategy. I had the opportunity to expand on this, detailing our EMEA SMB…

Read More

Discover Why LAN Upgrades Are Crucial for Business Growth

Discover Why LAN Upgrades Are Crucial for Business Growth

Many businesses today find themselves tethered to outdated equipment that cannot handle modern networking demands. Why is it crucial that they upgrade their access networks? Older wireless access points slow down network performance. Legacy access switches may lack the Power over Ethernet (PoE) capacity needed to support new collaboration tools, IoT devices, and AI. Antiquated network management tools can leave infrastructure vulnerable to attack and unable to handle the growing demands of user and device…

Read More

Need to relax? This new iPhone feature does the trick for me – here's how

Need to relax? This new iPhone feature does the trick for me – here's how

Lance Whitney / Elyse Betters Picaro / ZDNET One of my favorite features in iOS 18.4 is Ambient Music. Here, you can add and access four different music tracks with gentle and calming sounds. Depending on the mood you want to achieve, you can choose from among four categories of music: Sleep, Chill, Productivity, and Wellbeing. Also: What’s new in iOS 18.4? AI priority notifications and 9 other big updates I often listen to one of…

Read More

Chinese Hackers Exploit Backdoor to Spy on European Businesses

Chinese Hackers Exploit Backdoor to Spy on European Businesses

A Chinese cyber espionage tool initially made for intrusion into Linux systems has been used to spy on European organizations via Windows. On April 15, European cybersecurity company NVISO published a report with new findings on BRICKSTORM, a backdoor linked to the China-nexus cluster UNC5221 previously believed to target Linux vCenter servers. In the report, NVISO researchers shared that they discovered two new BRICKSTORM samples affecting Windows environments. These new samples have been used as…

Read More

Tenable Appoints Steve Vintz and Mark Thurmond as Co-CEOs

Tenable Appoints Steve Vintz and Mark Thurmond as Co-CEOs

Tenable®, the exposure management company, today announced that its Board of Directors has unanimously appointed Steve Vintz and Mark Thurmond as co-Chief Executive Officers on a permanent basis. Following an extensive search process that considered both internal and external candidates, the Board concluded that Vintz and Thurmond are best positioned to move the company forward. The decision reflects the Board’s confidence in the strength of their leadership following a successful interim period during which they…

Read More

Understanding the 2025 HIPAA Security Rule Updates: A Comprehensive Analysis of Healthcare Cybersecurity Enhancements

Understanding the 2025 HIPAA Security Rule Updates: A Comprehensive Analysis of Healthcare Cybersecurity Enhancements

Introduction The evolving landscape of healthcare cybersecurity is undergoing a major transformation with the Department of Health and Human Services’ (HHS) December 27, 2024, proposal to update the HIPAA Security Rule. This update, the most significant revision since 2013, reflects the growing complexity of healthcare cybersecurity, particularly as organizations face an average of 43 cyberattacks per year according to Ponemon Institute. Background and Context Originally designed to safeguard electronic protected health information (ePHI), the HIPAA Security…

Read More
1 40 41 42 43 44 4,265