The AI factor in cybersecurity: Sundareshwar Krishnamurthy, PwC India – ET CISO
Firewall Firm Blog
by
1w ago
The AI factor in cybersecurity: Sundareshwar Krishnamurthy, PwC India – ET CISO https://etimg.etb2bimg.com/thumb/msid-109187878,imgsize-158566,width-1200,height=765,overlay-etciso/ot-security/the-ai-factor-in-cybersecurity-sundareshwar-krishnamurthy-pwc-india.jpg Sundareshwar Krishnamurthy, Partner and Leader – Cybersecurity, PwC India As digital transformation continues to reshape the business landscape, the conversation around cybersecurity has never been more pertinent. In an exclusive interview with ETCISO, Sundareshwar Krishnamurthy, Partner and Leader – Cybersecurity at PwC India, sheds ..read more
Visit website
Mobile security roadmap on anvil for AI-ML threats
Firewall Firm Blog
by
1w ago
Mobile security roadmap on anvil for AI-ML threats With the future pointing to mobile devices being integral parts of the Internet of Things (IoT) operated systems and even drones, India has started working on identifying key security concerns and possible solutions. The Union electronics and information technology ministry (MeitY) has launched Mobile Security Roadmap from 2024 to 2034 with five ..read more
Visit website
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
Firewall Firm Blog
by
1w ago
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files https://firewall.firm.in/wp-content/uploads/2024/04/hack.png “Test files” associated with the XZ Utils backdoor have made their way to a Rust crate known as liblzma-sys, new findings from Phylum reveal. liblzma-sys, which has been downloaded over 21,000 times to date, provides Rust developers with bindings to the liblzma implementation, an underlying library that is part ..read more
Visit website
Dutch chipmaker Nexperia hacked by cyber criminals
Firewall Firm Blog
by
1w ago
Dutch chipmaker Nexperia hacked by cyber criminals, IT Security News, ET CISO   Dutch-headquartered chipmaker Nexperia was victim of a hacking attack by cyber criminals last month, the Chinese-owned company said on Friday, and was investigating the incident with the help of outside specialists. “Nexperia has become aware that an unauthorized third party accessed certain Nexperia IT servers in March ..read more
Visit website
Will AI help or hinder trust in science?
Firewall Firm Blog
by
1w ago
Will AI help or hinder trust in science? In the past year, generative artificial intelligence tools – such as ChatGPT, Gemini, and OpenAI’s video generation tool Sora – have captured the public’s imagination. All that is needed to start experimenting with AI is an internet connection and a web browser. You can interact with AI like you would with a ..read more
Visit website
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Firewall Firm Blog
by
1w ago
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack https://firewall.firm.in/wp-content/uploads/2024/04/putty.png Apr 16, 2024NewsroomEncryption / Network Security The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a critical vulnerability impacting versions from 0.68 through 0.80 that could be exploited to achieve full recovery of NIST P-521 (ecdsa-sha2-nistp521) private keys. The flaw has been assigned ..read more
Visit website
Identity in the Shadows: Shedding Light on Cybersecurity’s Unseen Threats
Firewall Firm Blog
by
1w ago
Identity in the Shadows: Shedding Light on Cybersecurity’s Unseen Threats https://firewall.firm.in/wp-content/uploads/2024/04/silverfort.png Apr 16, 2024The Hacker NewsCloud Security / Threat Intelligence In today’s rapidly evolving digital landscape, organizations face an increasingly complex array of cybersecurity threats. The proliferation of cloud services and remote work arrangements has heightened the vulnerability of digital identities to exploitation, making it imperative for businesses to fortify ..read more
Visit website
Safeguarding connected cars from cybersecurity threats
Firewall Firm Blog
by
1w ago
Safeguarding connected cars from cybersecurity threats In an age where technology seamlessly integrates into various aspects of our lives, the concept of smart cars has become increasingly prevalent. These modern vehicles boast an array of features aimed at enhancing convenience, safety, and connectivity. However, along with these advancements comes the looming threat of cybersecurity breaches, which can compromise the safety ..read more
Visit website
Canadian federal police says they were targeted by cyberattack
Firewall Firm Blog
by
1M ago
Canadian federal police says they were targeted by cyberattack Canadian federal police said on Friday their systems were targeted by an “alarming” cyberattack but there was no impact on operations and no known threat to the safety of Canadians. “The situation is evolving quickly but at this time, there is no impact on RCMP operations and no known threat to ..read more
Visit website
How DevOps-centric security helps offset data privacy risks?
Firewall Firm Blog
by
1M ago
How DevOps-centric security helps offset data privacy risks? By Kavita Viswanath, Every time we go online, we leave a digital footprint of our personal information, interests, choices, health and financial transactions, and more. Same is true for businesses – as the rapid shift of operations to the digital environment enhances their business and operational efficiencies, improves productivity and performance, and ..read more
Visit website

Follow Firewall Firm Blog on FeedSpot

Continue with Google
Continue with Apple
OR