Challenges of deep fakes in cybersecurity

Challenges of deep fakes in cybersecurity

Deepfakes have been making the headlines with the technology being utilized in social engineering attacks and phishing schemes. In this episode of The Security Podcasts featuring Brent Arnold, a partner practicing in Gowling WLG’s Advocacy department, we discuss the challenges the security industry faces with more and more convincing deepfakes making the rounds. Or check it out on our Apple Podcasts or Spotify channels. Don’t forget to like, follow, and rate and review our podcasts!…

Read More

The threat landscape in H1 2023

The threat landscape in H1 2023

Cyber threats such as ransomware, artificial intelligence and malware have remained top concerns for security leaders. New technologies and new threat actors have changed the threat landscape, leading security leaders to adjust cybersecurity plans. According to a Check Point report, the education sector has remained the top cyberattack target through the first half of 2023, followed by the government and/or military and healthcare. The report found that retail had a 42% increase in cyberattacks —…

Read More

Getting ahead of the new normal: Counter-drone security

Getting ahead of the new normal: Counter-drone security

Today, commercially available drones are being used as weapons. Flying improvised explosive devices (IEDs) first emerged in the Iraq and Syrian conflicts around 2016. Terrorist organizations released videos of drones used for surveillance and reconnaissance as early as 2014. It did not take long for sophisticated criminals and drug cartels to mirror those tactics of foreign terrorist groups. One cartel has created a drone unit for this specific task. The developments in the Ukraine conflict…

Read More

Strong security posture means building effective partnerships

Strong security posture means building effective partnerships

Strong security posture means building effective partnerships | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Roles of AI, automation and humans in security

Roles of AI, automation and humans in security

Roles of AI, automation and humans in security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Creating an impactful culture in remote work environment

Creating an impactful culture in remote work environment

Creating an impactful culture in remote work environment | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

AI: Fraudster’s greatest weapon and a company’s greatest defense

AI: Fraudster’s greatest weapon and a company’s greatest defense

AI: Fraudster’s greatest weapon and a company’s greatest defense | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

The evolving generative AI risk landscape

The evolving generative AI risk landscape

The evolving generative AI risk landscape | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Unlocking the power of generative AI

Unlocking the power of generative AI

Unlocking the power of generative AI | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Small and home office router malware discovered by researchers

Small and home office router malware discovered by researchers

Small and home office router malware discovered by researchers | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2 3 4 5 6