Showing only posts by David Gordon. Show all posts.

How to enable secure use of AI

Source

Let the SANS AI Toolkit promote secure and responsible use of AI tools in the workplace Sponsored Post It's Cybersecurity Awareness Month again this October - a timely reminder for public and private sector organisations to work together and raise awareness about the importance of cybersecurity.... [...]

Application builders get ready

Source

Head down to Grey Matter ISV Partner Day to learn about the latest Microsoft technologies Sponsored Post This year's Grey Matter ISV Partner Day will bring together Microsoft-focused ISVs, SaaS Providers and application builders from the UK and Ireland to learn about the latest Microsoft technologies from the software …

Kick off early Octoberfest with an EUC-fest

Source

Visit IGEL’s DISRUPT Munich event this September to learn more about the latest end user computing technologies Sponsored Post The IGEL DISRUPT Munich event promises an opportunity to explore the latest innovations in end user computing (EUC), with a focus on endpoint security, Zero Trust, digital workspaces and …

Fighting AI fire with AI fire

Source

Palo Alto Networks reveals how AI can be harnessed to strengthen cyber security defenses David Gordon Sponsored Post Hackers and cyber criminals are busy finding new ways of using AI to launch attacks on businesses and organizations often unprepared to deal with the speed, scale and sophistication of the …

Respect your data, and protect it

Source

Hear how AI runtime security secures applications in the complete journey from design to build to run Sponsored Post Ensuring access to mission critical, AI-enabled applications is important for modern businesses keen on boosting employee productivity and transforming customer operations. But not if it compromises data security.... [...]

How to counter adversarial AI

Source

Using Precision AI to stop cyber threats in real time Sponsored Hackers and cyber criminals are busy finding new ways of using AI to launch attacks on businesses and organisations often unprepared to deal with the speed, scale and sophistication of the assaults directed against them.... [...]

Time to zero in on Zero Trust?

Source

Recently discovered vulnerabilities in VPN services should push ASEAN organizations to rethink their perimeter security approach Sponsored Post Companies the ASEAN region have long relied on a virtual private network (VPN) to help encrypt their Internet traffic and protect users' online identities.... [...]

Facing down the triple threat

Source

The Register’s Tim Philips gets down and dirty on cyber security in this interview with Rubrik CISO Richard Cassidy Sponsored Post There were hard words about the state of Britain's cyber security in parliament recently, but it's not just the country's critical national infrastructure which may be underprepared …

When AI attacks

Source

Watch this webinar for a hair raising journey into the darkest depths of GenAI enabled cyber crime Sponsored Post Artificial intelligence (AI) offers enormous commercial potential but also substantial risks to data security if it is harnessed by cyber criminals intent on stealing or corrupting sensitive information for their …

The easy road to pervasive DLP

Source

How Forcepoint Data Security Everywhere does what it says on the tin Sponsored Post The coronavirus pandemic appears to have changed the employment landscape forever, with estimates suggesting that up to a quarter of staff still spend some of their working week outside of the office compared to just …

Helping you bridge the cloud security gap

Source

Learn how to implement effective identity and access management with Entra ID and SANS Sponsored Post The job of the cyber security professional is never easy, and it gets progressively harder with the movement of sensitive data and applications across the multiple different on and off premise systems that …

Will you meet the directive?

Source

Your guide to SEC, DoD 8140.3 and NIS2 changes with the SANS Cyber Compliance Countdown Sponsored Post Imminent changes to cyber security regulations in the US and Europe demand that public and private sector organizations on both side of the Atlantic keep a close eye on their compliance …

Exercise Cyber Star tests Singapore response

Source

How SANS is helping boost the island’s defenses against whole-of-nation cyber attacks Sponsored The cyber attack which culminated in the personal details of 1.5m patients being compromised after hackers broke into the databases of SingHealth in 2018 provides a stark illustration of why organizations in Singapore need …

page 1 | older articles »