Study: Consumers ambivalent about deep fake content
Cyber Protection Magazine
by Lou Covey
4d ago
A recent study performed by Synthedia has found that consumers are, by and large, ambivalent over the value and threats of deepfake content generated by artificial intelligence. Just under 40 percent view the technologies as positive and just under 50 percent view them negatively. While such ambivalence would normally indicate the marketing for this technology has yet to reach a broader audience, the study also found that most consumers have already experienced deep fake technology in some form over various media outlets. The study was sponsored by PinDrop and Voicebot. Pindrop makes tools for ..read more
Visit website
ChatGPT One Year On: The good, the bad and the unknown
Cyber Protection Magazine
by Editors Desk
4d ago
ChatGPT first launched on 30th November 2022, reaching a record-breaking one million users within five days. Since then it has only continued to climb to new heights, with estimations putting the number of users at around 180.5 million as of November 2023. Despite its popularity, ChatGPT has been a contentious topic. On one side, you have advocates for how generative AI can aid efficiency and productivity, identifying trends to protect us from cyber threats better than any human ever could. But in the opposite corner, you have voices that are hugely concerned about data privacy and the mass la ..read more
Visit website
The #1 Way to Protect Against Cybersecurity’s Primary Threat Surface
Cyber Protection Magazine
by David Schiffer
5d ago
Security leaders know that email has been a top cyberattack surface for years. While organizations invest billions globally in a broad spectrum of cybersecurity technologies, the vast majority of phishing breaches are the result of people inadvertently clicking on malicious links within emails. A strong foundation of multi-layered email security is the best way to protect email servers and user inboxes from a disastrous breach. End-to-end email security covers all email attack surfaces and vectors Email servers and user endpoint inboxes are two primary locations for cyberattacks to infiltrate ..read more
Visit website
Black Friday Fears: Beating Cybercriminals to the Bargains
Cyber Protection Magazine
by Editors Desk
1w ago
Although Black Friday is officially the weekend after Thanksgiving in America – this year falling on 24th November – the sales now begin weeks before the event, often extending throughout the whole month. As Robert Sugrue, Cyber Security Product Director, Six Degrees, reflects, “Black Friday, Cyber Monday and the whole ‘Thanksgiving give-aways’ are not what they used to be! Nevertheless, our suppliers of goods and services continue to ply us with once in a lifetime, too good to be true offers, as our minds turn to buying Christmas gifts and saving a few quid at the same time!” Each year the Bl ..read more
Visit website
Privacy Not Included Group dings Amazon this year
Cyber Protection Magazine
by Lou Covey
1w ago
The Thanksgiving holiday is upon us and you know what that means. Groggy consumers lining up at Best Buy or logging onto Amazon to pick up Black Friday deals on the latest electronics and digital products, sometimes for gifts. Oh, the humanity. But before you rush out, we are revisiting one of our favorite sites, PrivacyNotIncluded.org run by the Mozilla Foundation and the head of the group, Jen Caltrider. We last interviewed Jen two years ago when Meta was still relatively shiny and filled with hope. It didn’t fare well with the group’s evaluation. The good news is Meta is no longer the worst ..read more
Visit website
Preparing for the future: Navigating an identify-based approach to data security
Cyber Protection Magazine
by Stuart Hodkinson
2w ago
The saying that ‘data is the lifeblood of an organisation’ may feel like it is over-used within the security space, but as the threat landscape continues to evolve, sensitive company data is at an increased risk of being breached. Without a robust data management strategy in place, data is not always guaranteed to be accessible, integrable or protected. Many companies remain stuck in the past, relying on static solutions that are difficult to maintain and often unable to meet the demands of today’s fast-paced businesses. Perimeter-based solutions, provide some value but they cannot keep up wit ..read more
Visit website
SEC v. SolarWinds: a tipping point for consolidation?
Cyber Protection Magazine
by Lou Covey
2w ago
The SEC lawsuit against SolarWinds Corporation and CISO Tim Brown may upend an industry push for consolidation. It also questions whether large public companies providing security tools and services are any more up to the task than smaller, innovative companies. Moreover, the argument put forward by SolarWinds against the suit brings into question whether their public statements can be trusted, according to industry sources. Considering how big a presence they have, their positions could damage trust in the industry overall. The background The suit is one of a string of securities fraud action ..read more
Visit website
The Hidden Hand of the Hacker Market
Cyber Protection Magazine
by Thomas Caliendo
3w ago
Unprecedented trends of data breaches reflect a more fundamental shift in the underground criminal market. Over the past 12 months  breaches grew more frequent than ever previously recorded. The hackers behind data breaches stole record-breaking numbers of login credentials. Hackers increasingly used more stolen credentials to carry out new hacks leading to new data breaches. This article explores these and other trends related to data breaches, the underlying factors driving these trends, and what to expect in the near future. Stolen credentials now have a bigger role than ever before in ..read more
Visit website
Navigating the Digital Battleground – Expert Voices on Cybersecurity Awareness Month
Cyber Protection Magazine
by Editors Desk
1M ago
October has ended, and at Cyber Protection Magazine it has been a busy month. Does that mean we missed Cybersecurity Awareness Month? Not really, for us, every month is Cybersecurity Awareness Month. As digital realms continue to weave into the fabric of our daily lives, the importance of staying cyber-aware is ever-growing. Industry leaders weigh in on the importance of this month and offer invaluable insights to strengthen our cyber defenses. Understanding the Gravity of Cybersecurity Jason Dettbarn, Founder & CEO of Addigy, underscores the transformation of cybersecurity discussions fro ..read more
Visit website
Biden’s EOs on AI is more CYA than action
Cyber Protection Magazine
by Lou Covey
1M ago
President Joe Biden’s issuance of executive orders on AI development was all the news this week. It may not be all that important in the larger scheme. It certainly set the cybersecurity world all a-twitter about what it would mean for AI security. Journalist’s inboxes filled up with extensive quotes from company executives to highlight their company’s contribution to the effort. Michael Leach, Compliance Manager for Forcepoint, said in a sentence worthy of Joycian stream of consciousness, “The new Executive Order provides valuable insight for the areas that the U.S. government views as critic ..read more
Visit website

Follow Cyber Protection Magazine on FeedSpot

Continue with Google
Continue with Apple
OR