The recent cyberleak involving the ‘AI Girlfriend’ app has sent shockwaves through the tech …
Customer Data Security
-
-
Customer Data Securityglobal supply chain dynamicsSemiconductor ManufacturingTechnology Governance
Netherlands takes control of China-owned chip maker Nexperia
by Samantha Rowland 2 minutes readThe recent news of the Netherlands taking control of the China-owned semiconductor maker Nexperia …
-
AI in CybersecurityCustomer Data SecurityDigital Privacy
70,000 users may have had IDs leaked in Discord breach
by Samantha Rowland 2 minutes readIn a recent unsettling turn of events, the privacy and security of approximately 70,000 …
-
3D printing technologyAI and Machine Learning in ComplianceCustomer Data Security
Take Note: Cyber-Risks With AI Notetakers
by Priya Kapoorby Priya Kapoor 2 minutes readIn the dynamic landscape of online meetings, transcription applications have become indispensable tools, offering …
-
Acquisitions in the Retail IndustryAI TechnologyCustomer Data Security
Global study reveals increased trust in AI despite security gaps
by Priya Kapoorby Priya Kapoor 2 minutes readGlobal Study Reveals Increased Trust in AI Despite Security Gaps In a recent global …
-
AI in CybersecurityCustomer Data SecuritySaaS Applications
SaaS Breaches Start with Tokens – What Security Teams Must Watch
by Nia Walkerby Nia Walker 2 minutes readIn the ever-evolving landscape of cybersecurity, the issue of token theft has emerged as …
-
AI in CybersecurityCustomer Data Security
GitHub Adds Post-Quantum Secure SSH Key Exchange to Protect Git Data in Transit
by Nia Walkerby Nia Walker 2 minutes readGitHub Adds Post-Quantum Secure SSH Key Exchange to Protect Git Data in Transit In …
-
AI & Cloud ComputingBig Data ManagementCustomer Data SecurityData InfrastructureIT and Software DevelopmentOpen Source Technologies
The New Economics of Open Source Data Infrastructure
by Nia Walkerby Nia Walker 2 minutes readThe landscape of data infrastructure is undergoing a significant transformation, driven by the rise …
-
Customer Data SecurityEthics in TechnologyGovernment Surveillance
ICE bought vehicles equipped with fake cell towers to spy on phones
by Nia Walkerby Nia Walker 2 minutes readTitle: Unveiling ICE’s Use of Fake Cell Towers for Phone Surveillance In a recent …
-
AI in CybersecurityCustomer Data SecurityMalware Protection
XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities
by Jamal Richaqrds 2 minutes readXWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities In the ever-evolving …