The FBI reports that complaints around deepfake AI videos have more than doubled, and financial losses have nearly tripled this year. […]
Category: Q&A
Data sovereignty, cloud and security [Q&A]
As more and more information is stored in the cloud, often with hyperscale providers, the issue of data sovereignty — […]
AI video tools and how they’re changing business communication [Q&A]
The use of AI video has exploded in the past year. But while it’s deepfakes that make the headlines the […]
The silent danger of SSH key mismanagement [Q&A]
The recent AyySSHush botnet campaign compromised over 9,000 ASUS routers worldwide via SSH key injection. Unlike traditional botnets, this campaign […]
Why SaaS apps are a prime target for attackers [Q&A]
Attackers will always use tactics that are proven to work and with more business turning to SaaS for their systems […]
Governing AI where work actually happens [Q&A]
Enterprises are rushing to embrace AI copilots and browser-based assistants, but most struggle with governing how employees actually use them. […]
Why silos restrict scale — and what to do about it [Q&A]
Silos, you might think, are bit of a niche issue. They arise when old practices become entrenched, or when tools […]
How self-governing identity infrastructure can streamline policy enforcement [Q&A]
Managing identity is one of the more challenging cybersecurity tasks and can soak up a good deal of time and […]
GenAI lacks the creativity to make scientific discoveries [Q&A]
Generative AI is often praised for its ability to analyze data, summarize research and even propose scientific ideas, but new […]
Why concentrating data in AI models demands greater vigilance [Q&A]
Data that was once scattered across sprawling systems and silos — providing natural obstacles to attackers — is now concentrated […]
