Explore Sift’s recap of Money20/20, the latest product news, industry recognition, and perspectives on fraud and AI. The post Digital Trust & Safety Roundup: Protecting fintech at Money20/20, the truth about AI and fraud, industry awards, and the latest product…
Category: Security Boulevard
Chip Buyers Sue Intel Over Downfall Vulnerability
Five chip buyers are accusing Intel of failing to address security flaws in its CPUs that it has known about for five years, making the computers either open to the Downfall vulnerability disclosed in August or low-performing after applying a…
Digital Collaboration: A Double-edged Sword
How to Ensure Efficiency and Cybersecurity Digital collaboration tools have skyrocketed as a crucial component in companies across the globe. According to a survey by Gartner, there has been a staggering 44% surge in workers’ use of collaboration tools since…
Compliance Risk Assessments: 5 Essential Steps for Success
Editor’s note: This blog post is an excerpt from our ebook The 10 Key Elements of An Effective Compliance Program. You can download the entire ebook here. Why it’s Important to Conduct Compliance Risk Assessments Compliance programs must be customized…
Google Suing Scammers for Fake Bard AI Chatbot Scheme
Google is suing at least three people for using false ads for Bard, the company’s generative AI chatbot, to trick people into unknowingly downloading malware that gives the alleged scammers access to their social media accounts. In another lawsuit, Google…
LockBit Crashes Boeing Dark Web Data — No Ransom Paid
7oops7: Seattle plane maker tries to tell us the 50GB dump is ever so boring and not worth spinning up Tor for. The post LockBit Crashes Boeing Dark Web Data — No Ransom Paid appeared first on Security Boulevard. This…
Law Firm Security: Why IT Must Take Control Over User Risk
In today’s law firms, most IT professionals view user behavior and lack of training to prevent these behaviors as the top risk to security. Indeed, user behavior/training arose as a greater concern than ransomware or any threat actor tactic that…
The Dangers of Using Weak or Reused Passwords
Passwords are the first line of defence for many of our online accounts. A strong password can help to protect our personal information, financial data, and even our identities from being stolen. However, many people still use weak or reused…
How AI and Automation Can Secure Enterprises and Startups
Today’s developers face myriad challenges. On the one hand, today’s threat landscape continues to evolve, with new threats becoming more targeted and sophisticated. On the other hand, the speed of innovation has accelerated to facilitate the ongoing adoption of remote…
Palo Alto Networks SOC Update Extends Machine Learning Reach
Palo Alto Networks updated its SOC platform that enables cybersecurity teams to build their own ML models. The post Palo Alto Networks SOC Update Extends Machine Learning Reach appeared first on Security Boulevard. This article has been indexed from Security…