Technology

 

How to Use Generative AI Tools While Still Protecting Your Privacy (Wired)

The explosion of consumer-facing tools that offer generative AI has created plenty of debate: These tools promise to transform the ways in which we live and work while also raising... More

Fortinet NGFWs, FortiGuard AI-Powered Security Services Deliver 318% ROI and Payback in Six Months For the Enterprise Data Center

Fortinet announced an independent analysis of the cost savings and business benefits of deploying FortiGate Next-Generation firewalls (NGFWs) and FortiGuard AI-Powered Security Ser... More

XL8 Strengthens Enterprise Security With Key New Hire

Parweiz Mustan, a seasoned security expert, is the newest member of the XL8 team. Parweiz brings a wealth of experience in developing, scaling, and nurturing legal, compliance, and... More

If You Don’t Already Have a Generative AI Security Policy, There’s No Time to Lose (CSO Online)

Businesses are finding more and more compelling reasons to use generative AI, which is making the development of security-focused generative AI policies more critical than ever.... More

How Generative AI Can Help Organizations Overcome Threat Intelligence Program Challenges (CSO Online)

Used as an analyst assist application, generative AI can help threat intelligence programs in areas like data collection, analysis, and dissemination.... More

Bluescape’s FedRAMP-Authorized Virtual Workspace Available Through DTS

Bluescape has partnered with DTS, a cyber, consulting, and management services company, to deliver its virtual work platform to the firm's government customers. The partnership wil... More

How Fastly Thinks Differently About CDNs and the Edge (CW)

Fastly is counting on its developer chops and different approaches towards security and other areas to compete with its rivals.... More

AI-generated Music: Timeless Legacy or Copyright Breach? (Farrer & Co)

As with other forms of generative AI, some of the most significant areas of legal and ethical controversy (at least for creatives) relate to the unauthorized use of existing works,... More

How Achievement First Leverages Veeam + Wasabi For Fast, Economical Recovery (Wasabi Blog)

Achievement First wanted to be as resilient as possible in the face of disasters, including system failures, natural phenomena and cyberattacks like ransomware.... More

Survey: 92% of Programmers are Using AI Tools (ZDNet)

Developers say AI coding tools help them meet existing performance standards with improved code quality, faster outputs, and fewer production-level incidents. It's also all about s... More

12 Questions to Ask a Monitoring and Enforcement Vendor (FriendMTS Blog)

So you need to implement a content fraud detection and takedown solution. But how do you decide which solution, and which vendor, are the right ones for you? You need to thoroughly... More

Fortinet Expands Global Secure SD-WAN and SASE Presence With New MSSP Partnerships

Fortinet announced that 11 new managed security service providers (MSSPs) have adopted Fortinet Secure SD-WAN to help drive better business outcomes and experiences for their custo... More

Irdeto Deploys Multi-DRM Across RTHK (BTN)

The broadcaster will use the technology to both protect its premium video content and scale its streaming services.... More

Kudelski Group Expands Quantum Security Solutions to Address Advanced and Evolving Threat Landscape

With quantum computing technology rapidly becoming a significant disruptor in the world of cybersecurity, existing cryptographic systems are increasingly at risk. (more…)... More

The 5G Juggernaut: Survey Reveals Key Trends and Challenges For 5G Technology Deployment (Arm Blueprint)

The 5G revolution is underway, with providers around the world racing to offer faster, more reliable wireless service. According to recent data, the number of 5G subscriptions is g... More

Protect Your Business From Automated Threats: The Importance of Bot Management (Edgio Blog)

As businesses increasingly rely on technology to operate, they are also becoming more vulnerable to cyber-attacks. The most prevalent threats today leverage the use of malicious bo... More

Catching Up With Adobe’s Chief Security Officer, Maarten Van Horenbeeck

Maarten Van Horenbeeck joined Adobe as chief security officer last fall. We caught up with Maarten to get his thoughts on the industry, his career journey, what piqued his initial ... More

Why Cyber is Also a CIO Problem (CD)

When an incursion occurs, IT teams need a recovery plan and backup systems ready to deploy.... More

Why DRM Alone is Not Enough (Verimatrix Blog)

The importance of “retrofitting” DRM with modern cybersecurity solutions and why it is essential to protect your video content from today’s hacker-pirates.... More

Generative AI Has an Intellectual Property Problem (HBR)

Generative AI, which uses data lakes and question snippets to recover patterns and relationships, is becoming more prevalent in creative industries. However, the legal implications... More

Sign up for our newsletters
* indicates required
MESA Newsletters