Proofpoint unveils unified platforms to combat data & cyber risks

Proofpoint unveils unified platforms to combat data & cyber risks

Proofpoint has introduced two new cybersecurity solutions aimed at unifying threat protection and data security across multiple digital channels and organisational environments. The first of these offerings, Proofpoint Prime Threat Protection, is described by the company as a unified, human-centric threat protection platform delivering multichannel, multistage defence across email, cloud applications, and collaboration tools. The second solution, a Unified Data Security Solution, brings together data loss protection, data security posture management, and insider threat management…

Read More

Why red teaming matters even more when AI starts setting its own agenda

Why red teaming matters even more when AI starts setting its own agenda

Niko Nieminen via Unsplash Today, people see generative artificial intelligence (AI) as the hidden author behind student essays and doubling as a fancy search engine. But beneath the basic prompt-response interface, these tools are quickly being designed to grow more capable and more autonomous — and therefore more unpredictable. Both users and designers are handing over increasingly complex tasks and expecting AI to act with less guidance over time and across applications. These will not…

Read More

Does Your SSE Understand User Intent?

Does Your SSE Understand User Intent?

Enhanced Data Protection With AI Guardrails With AI apps, the threat landscape has changed. Every week, we see customers are asking questions like: How do I mitigate leakage of sensitive data into LLMs? How do I even discover all the AI apps and chatbots users are accessing? We saw how the Las Vegas Cybertruck bomber used AI, so how do we avoid toxic content generation? How do we enable our developers to debug Python code…

Read More

Building Simpler, Resilient, and AI-Ready Networks

Building Simpler, Resilient, and AI-Ready Networks

I sat down with senior leaders from Colt, stc Group, and Swisscom to hear these innovative service providers’ strategies for the delivery of digital experiences in an AI-powered world. We talked about how they are simplifying their networks to meet growing customer demands and how they are embracing assurance, automation, and autonomous networking to transform their operations, ensure the resiliency of their services, and drive new revenue streams. Q: Jason Teller—Yasser, congratulations on the success…

Read More

Cisco U. Spotlight: Your Best Day of Learning is Waiting

Cisco U. Spotlight: Your Best Day of Learning is Waiting

If you feel like the world of tech just entered a fast-forward time machine, you’re not alone. That’s why we’ve organized this year’s Cisco U. Spotlight on April 24, 2025, to share our vision of what’s ahead and help you learn the skills that matter most in the tech landscape of today AND tomorrow. Our themes: pillars of digital resilience Looking ahead to the strategies and technologies of the future is an essential part of…

Read More

Help Us Keep You in the AI Driver’s Seat

Help Us Keep You in the AI Driver’s Seat

Cisco Learning & Certifications is on a mission to provide you with AI learning that checks off all your boxes for meaningful, interesting, and relevant learning. We want to help you embrace the capabilities of AI to improve your work, no matter your role—and use AI as a resource to help you become more effective—now and into the future. It’s all about potential. But we do need the most complete picture we can get about…

Read More

From Firewalls to AI: The Evolution of Real-Time Cyber Defense

From Firewalls to AI: The Evolution of Real-Time Cyber Defense

The traditional Intrusion Detection Systems (IDS) have depended on rule-based or signature-based detection, which are challenged by evolving cyber threats. Through the introduction of Artificial Intelligence (AI), real-time intrusion detection has become more dynamic and efficient. Today we’re going to discuss the various AI algorithms that can be investigated to identify what works best when it comes to identifying anomalies and threats in firewall security. Exploring AI Algorithms for Intrusion Detection Random Forest (RF) is a machine learning algorithm that generates several decision trees and aggregates their predictions in order to classify network traffic as malicious or normal. RF is extremely popular in IDS due to its fast processing, interpretability, and ability…

Read More

RSA 2025 Product Preview

RSA 2025 Product Preview

RSA 2025 takes place from April 28 through May 1 in San Francisco, California, bringing together cybersecurity leaders from all over the country. Security magazine highlights a few products from this year’s RSA exhibitors. 1Password Automatically Generates Passwords 1Password’s built-in password generator creates secure passwords for all online accounts. Users can go passwordless by saving and signing in to compatible websites and apps with passkeys. Save and autofill passwords, two-factor authentication codes, financial addresses, and more in…

Read More

The Shift Redefining Physical Identity Management

The Shift Redefining Physical Identity Management

Every time a security breach occurs, organizations scramble to trace the failure. Often, the answer lies not in their policies, but in outdated identity management systems ill-equipped to meet today’s demands. Legacy PIAM systems were designed for a simpler time, before the rise of hybrid workplaces, AI-driven security tools, and Zero Trust principles. Yet, these systems persist, plagued by limitations in scalability, integration, and security. They fail to provide real-time insights, leaving organizations vulnerable to…

Read More

The AI arms race in cybersecurity: Why trust is the ultimate defense

The AI arms race in cybersecurity: Why trust is the ultimate defense

Artificial intelligence (AI) is reshaping cybersecurity at a pace that few anticipated. It is both a weapon and a shield, creating an ongoing battle between security teams and cybercriminals. Organizations are using AI to detect threats faster, automate responses, and strengthen defenses. At the same time, attackers are deploying AI to craft highly convincing phishing campaigns, evade detection, and exploit vulnerabilities at speeds human hackers never could. This arms race is redefining the cybersecurity landscape,…

Read More
1 2 3 4 35