article thumbnail

Cybersecurity Snapshot: Cyber Agencies Offer Secure AI Tips, while Stanford Issues In-Depth AI Trends Analysis, Including of AI Security

Tenable

Check out recommendations for securing AI systems from the Five Eyes cybersecurity agencies. 1 - Multinational cyber agencies issue best practices for secure AI deployment Looking for best practices on how to securely deploy artificial intelligence (AI) systems? And much more! and the U.S.

article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

Wireless 232
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: How To Boost the Cybersecurity of AI Systems While Minimizing Risks

Tenable

Check out expert recommendations for deploying AI tools securely. 1 - How to ensure AI helps, not hurts, cybersecurity How can organizations use artificial intelligence (AI) in a way that’s safe and that benefits cybersecurity? In addition, cyber insurance demand is forecast to grow robustly. And much more!

article thumbnail

Popcorn’s new app brings short-form video to the workplace

TechCrunch

A new startup called Popcorn wants to make work communication more fun and personal by offering a way for users to record short video messages, or “pops,” that can be used for any number of purposes in place of longer emails, texts, Slack messages or Zoom calls. Image Credits: Popcorn. try mine at U8696). try mine at U8696).

Video 231
article thumbnail

How to make your Zoom meetings more secure

The Parallax

Zoom , the video-conferencing app darling of the stay-at-home coronavirus era, is zooming through some cybersecurity growing pains alongside explosive growth. Most recently, ex-National Security Agency researcher Patrick Wardle revealed two vulnerabilities that require physical access to a Mac running Zoom.

Meeting 246
article thumbnail

Cybersecurity Snapshot: Salary Trends, Ransomware Summit, Next-gen MFA

Tenable

Get the latest on salary trends for CISOs and cybersecurity pros; CISA’s call for adopting phishing-resistant MFA; the White House’s ransomware summit; and more! and Canada improved this year compared with 2021 as employers paid up to retain their cybersecurity chiefs amidst a shortage of qualified candidates for these jobs.

Trends 102
article thumbnail

Why we built it: Inside the mind of application security innovator Christien Rioux

Lacework

Welcome back to our Q&A series where we spotlight some of the innovative experts behind our code security solution. Today, we’re featuring Christien Rioux, an application security expert with more than 30 years of computer programming and software engineering experience. Q: What first sparked your interest in engineering?