Challenges of deep fakes in cybersecurity

Challenges of deep fakes in cybersecurity

Deepfakes have been making the headlines with the technology being utilized in social engineering attacks and phishing schemes. In this episode of The Security Podcasts featuring Brent Arnold, a partner practicing in Gowling WLG’s Advocacy department, we discuss the challenges the security industry faces with more and more convincing deepfakes making the rounds. Or check it out on our Apple Podcasts or Spotify channels. Don’t forget to like, follow, and rate and review our podcasts!…

Read More

Strong security posture means building effective partnerships

Strong security posture means building effective partnerships

Strong security posture means building effective partnerships | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

3 ways AI can handle third-party vendor and supplier risk challenges

3 ways AI can handle third-party vendor and supplier risk challenges

3 ways AI can handle third-party vendor and supplier risk challenges | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Combatting the next wave of AI fraud

Combatting the next wave of AI fraud

Combatting the next wave of AI fraud | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Roles of AI, automation and humans in security

Roles of AI, automation and humans in security

Roles of AI, automation and humans in security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Security needs to make its voice heard in AI implementations

Security needs to make its voice heard in AI implementations

Security needs to make its voice heard in AI implementations | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Creating an impactful culture in remote work environment

Creating an impactful culture in remote work environment

Creating an impactful culture in remote work environment | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

How to communicate AI cyber risk to the C-suite

How to communicate AI cyber risk to the C-suite

How to communicate AI cyber risk to the C-suite | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Generative AI in the enterprise: 4 steps to prepare organizations

Generative AI in the enterprise: 4 steps to prepare organizations

Generative AI in the enterprise: 4 steps to prepare organizations | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

AI: Fraudster’s greatest weapon and a company’s greatest defense

AI: Fraudster’s greatest weapon and a company’s greatest defense

AI: Fraudster’s greatest weapon and a company’s greatest defense | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 3 4 5 6 7