Balancing data privacy and security in the age of AI-powered defenses

Balancing data privacy and security in the age of AI-powered defenses

Cyber threats are always evolving. Not only has artificial intelligence (AI) lowered the bar required to launch an attack, but adversaries are also using the technology to enhance the speed and sophistication of their tactics — through methods like code generation, password cracking, social engineering, phishing attempts and more. For example, hackers can use generative AI to build convincing profiles on social media platforms, making it easier for hackers to impersonate individuals or create fake…

Read More

Today’s SIEM data challenges require data decoupling

Today’s SIEM data challenges require data decoupling

Today’s SIEM data challenges require data decoupling | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Unlocking Industrial Data: The EU Data Act

Unlocking Industrial Data: The EU Data Act

On November 27, the European Council adopted the EU Data Act. Part of the larger EU Data Strategy to infuse competition and drive more data-driven innovation within the region, the Data Act will make data generated by connected devices and related services (industrial data) accessible to EU consumers and companies. Rules and regulations around data governance are not new. There are already laws in place to protect personal or classified data and to open up…

Read More

Responsible AI is built on a foundation of privacy

Responsible AI is built on a foundation of privacy

Nearly 40 years ago, Cisco helped build the Internet. Today, much of the Internet is powered by Cisco technology—a testament to the trust customers, partners, and stakeholders place in Cisco to securely connect everything to make anything possible. This trust is not something we take lightly. And, when it comes to AI, we know that trust is on the line. In my role as Cisco’s chief legal officer, I oversee our privacy organization. In our…

Read More

The hidden risk within the surveillance industry

The hidden risk within the surveillance industry

The hidden risk within the surveillance industry | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

A generative AI guidebook was released for CISOs

A generative AI guidebook was released for CISOs

A generative AI guidebook was released for CISOs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Encryption bridges gap between data protection & digital identity

Encryption bridges gap between data protection & digital identity

Encryption bridges gap between data protection & digital identity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Are federal regulations the watershed moment for zero trust?

Are federal regulations the watershed moment for zero trust?

Are federal regulations the watershed moment for zero trust? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2 3 4 14