Technology
How to Use Generative AI Tools While Still Protecting Your Privacy (Wired)
The explosion of consumer-facing tools that offer generative AI has created plenty of debate: These tools promise to transform the ways in which we live and work while also raising... More
Fortinet NGFWs, FortiGuard AI-Powered Security Services Deliver 318% ROI and Payback in Six Months For the Enterprise Data Center
Fortinet announced an independent analysis of the cost savings and business benefits of deploying FortiGate Next-Generation firewalls (NGFWs) and FortiGuard AI-Powered Security Ser... More
XL8 Strengthens Enterprise Security With Key New Hire
Parweiz Mustan, a seasoned security expert, is the newest member of the XL8 team. Parweiz brings a wealth of experience in developing, scaling, and nurturing legal, compliance, and... More
If You Don’t Already Have a Generative AI Security Policy, There’s No Time to Lose (CSO Online)
Businesses are finding more and more compelling reasons to use generative AI, which is making the development of security-focused generative AI policies more critical than ever.... More
How Generative AI Can Help Organizations Overcome Threat Intelligence Program Challenges (CSO Online)
Used as an analyst assist application, generative AI can help threat intelligence programs in areas like data collection, analysis, and dissemination.... More
Bluescape’s FedRAMP-Authorized Virtual Workspace Available Through DTS
Bluescape has partnered with DTS, a cyber, consulting, and management services company, to deliver its virtual work platform to the firm's government customers. The partnership wil... More
How Fastly Thinks Differently About CDNs and the Edge (CW)
Fastly is counting on its developer chops and different approaches towards security and other areas to compete with its rivals.... More
AI-generated Music: Timeless Legacy or Copyright Breach? (Farrer & Co)
As with other forms of generative AI, some of the most significant areas of legal and ethical controversy (at least for creatives) relate to the unauthorized use of existing works,... More
How Achievement First Leverages Veeam + Wasabi For Fast, Economical Recovery (Wasabi Blog)
Achievement First wanted to be as resilient as possible in the face of disasters, including system failures, natural phenomena and cyberattacks like ransomware.... More
Survey: 92% of Programmers are Using AI Tools (ZDNet)
Developers say AI coding tools help them meet existing performance standards with improved code quality, faster outputs, and fewer production-level incidents. It's also all about s... More
12 Questions to Ask a Monitoring and Enforcement Vendor (FriendMTS Blog)
So you need to implement a content fraud detection and takedown solution. But how do you decide which solution, and which vendor, are the right ones for you? You need to thoroughly... More
Fortinet Expands Global Secure SD-WAN and SASE Presence With New MSSP Partnerships
Fortinet announced that 11 new managed security service providers (MSSPs) have adopted Fortinet Secure SD-WAN to help drive better business outcomes and experiences for their custo... More
Irdeto Deploys Multi-DRM Across RTHK (BTN)
The broadcaster will use the technology to both protect its premium video content and scale its streaming services.... More
Kudelski Group Expands Quantum Security Solutions to Address Advanced and Evolving Threat Landscape
With quantum computing technology rapidly becoming a significant disruptor in the world of cybersecurity, existing cryptographic systems are increasingly at risk. (more…)... More
The 5G Juggernaut: Survey Reveals Key Trends and Challenges For 5G Technology Deployment (Arm Blueprint)
The 5G revolution is underway, with providers around the world racing to offer faster, more reliable wireless service. According to recent data, the number of 5G subscriptions is g... More
Protect Your Business From Automated Threats: The Importance of Bot Management (Edgio Blog)
As businesses increasingly rely on technology to operate, they are also becoming more vulnerable to cyber-attacks. The most prevalent threats today leverage the use of malicious bo... More
Catching Up With Adobe’s Chief Security Officer, Maarten Van Horenbeeck
Maarten Van Horenbeeck joined Adobe as chief security officer last fall. We caught up with Maarten to get his thoughts on the industry, his career journey, what piqued his initial ... More
Why Cyber is Also a CIO Problem (CD)
When an incursion occurs, IT teams need a recovery plan and backup systems ready to deploy.... More
Why DRM Alone is Not Enough (Verimatrix Blog)
The importance of “retrofitting” DRM with modern cybersecurity solutions and why it is essential to protect your video content from today’s hacker-pirates.... More
Generative AI Has an Intellectual Property Problem (HBR)
Generative AI, which uses data lakes and question snippets to recover patterns and relationships, is becoming more prevalent in creative industries. However, the legal implications... More