Security isn’t convenient, and that’s a big problem in the age of AI

Security isn’t convenient, and that’s a big problem in the age of AI

Security isn’t convenient. For most of us, traditional cybersecurity protocols like CAPTCHAs, two-factor authentication and passwords can feel like barriers that stand in the way of productivity. Whether that’s making a purchase, accessing workplace data or trying to log into an app that you were inadvertently kicked out of — we want what we want, we want it now and we often want it at the expense of our own data security and privacy. In…

Read More

Are AI data poisoning attacks the new software supply chain attack?

Are AI data poisoning attacks the new software supply chain attack?

With rapid AI adoption happening across varying business units, maintaining the integrity of those systems — and preventing AI data poisoning attacks — is a growing concern. But how do these attacks occur, and why should businesses be worried?  Much of it has to do with third-party access to business systems and data. In Venafi’s 2023 State of Cloud Native Security Report, 75% of security professionals stated their software supply chain presents their biggest security…

Read More

Rethinking network and security monitoring in the age of TLS 1.3

Rethinking network and security monitoring in the age of TLS 1.3

The adoption of the Transport Layer Security (TLS) 1.3 creates a watershed moment for cybersecurity, revolutionizing encryption and data protection standards. TLS has been widely used to secure data end-to-end for many decades. Though this latest version significantly enhances the security of the TLS protocol, it also severely limits the decryption of those data streams for cybersecurity and network monitoring purposes. This results in our current forms of network and security monitoring used with previous…

Read More

How to Steer Clear of Tax Season Scams

How to Steer Clear of Tax Season Scams

It’s that time of year again – tax season! Whether you’ve already filed in the hopes of an early refund or have yet to start the process, one thing is for sure: cybercriminals will certainly use tax season as a means to get victims to give up their personal and financial information. This time of year is advantageous for malicious actors since the IRS and tax preparers are some of the few people who actually…

Read More

Watch Out For IRS Scams and Avoid Identity Theft | McAfee

Watch Out For IRS Scams and Avoid Identity Theft | McAfee

It’s time to get those W-2 and 1099 tax forms ready. On January 29th, the IRS began accepting paper and electronic tax returns ahead of the April 15th due date. But as users prepare to file, scammers prepare to take advantage of innocent taxpayers with malicious tactics, looking to harvest the extensive amounts of personal data found in IRS tax documents. Let’s take a look at common tactics hackers may leverage this tax season. Impersonation…

Read More

Cisco and Nvidia: Redefining Workload Security

Cisco and Nvidia: Redefining Workload Security

There has been an exponential increase in breaches within enterprises despite the carefully constructed and controlled perimeters that exist around applications and data. Once an attacker can access the network, it becomes an “all you can eat” buffet as they move laterally around the environment, taking control, and either exfiltrating sensitive data, or locking it up with ransomware. Enterprises traditionally use two approaches to mitigate these risks: implementing intrusion detection solutions and defining micro-perimeters around…

Read More

Tap into connection points between security and privacy

Tap into connection points between security and privacy

Data privacy and information security are both critical components of building customer trust for organizations. Privacy protects our personal data and empowers us to control its use, while security shields information against unauthorized access and threats. Balancing these needs is key, like finding the sweet spot between convenience and robust protection. In the face of challenges posed by emerging technologies, evolving regulations and the escalating volume of data, privacy and security teams often find themselves…

Read More

Generative AI and IGA: Three considerations

Generative AI and IGA: Three considerations

The introduction of ChatGPT and the generative artificial intelligence (AI) model is one of the most significant new technology developments security leaders have seen. It’s impacting almost every sector of business, including identity governance. It can greatly lower the barrier to entry for the adoption of AI capabilities within a governance solution. With the help of AI, businesses can enhance their efficiency by automating numerous routine tasks and repetitive processes currently done by humans. It…

Read More

How Cybercriminals Are Shopping for Personal Data This Black Friday | McAfee Blog

How Cybercriminals Are Shopping for Personal Data This Black Friday | McAfee Blog

While the majority of us look forward to Black Friday and Cyber Monday for the best deals, there’s another group that’s also eagerly anticipating these dates – cybercriminals. As the number of online shoppers increases, so do the opportunities for cybercriminals to steal personal and financial information. In this article, we will take a closer look at how these cybercriminals operate, and how you can protect yourself from becoming a victim. With the advent of…

Read More

AI & Your Family: The Wows and Potential Risks | McAfee Blog

AI & Your Family: The Wows and Potential Risks | McAfee Blog

When we come across the term Artificial Intelligence (AI), our mind often ventures into the realm of sci-fi movies like I, Robot, Matrix, and Ex Machina. We’ve always perceived AI as a futuristic concept, something that’s happening in a galaxy far, far away. However, AI is not only here in our present but has also been a part of our lives for several years in the form of various technological devices and applications. In our…

Read More
1 2 3 11