AI scams using voice cloning are the new frontier for fraudsters
The rise of voice cloning illustrates the importance of sophisticated and multi-layered biometric authentication processes, says Gur Geva, founder and CEO of iiDENTIFii.
One of the most critical steps businesses can take to secure their public cloud environments is to implement strong authentication and access controls.
What is e-mail spoofing and how can you prevent it?
With software like Mailprotector’s CloudFilter e-mail filtering solution, and the right training, workers can learn to recognise dangerous e-mails and react appropriately.
Five critical components of effective ICS/OT security
Organisations in critical infrastructure sectors must be positioned to combat accelerating industrial control system attacks, says Dean Parsons, SANS certified ICS instructor, CEO and principal consultant of ICS Defense Force.
API abuse highlights dangers of unsafe open banking implementation
APIs are crucial to digital services because they enable different applications to share data and 'talk' to each other, says Avash Maharaj, head of infrastructure, cloud and security at Blue Turtle Technologies.
Strengthening cyber defences in the age of digital complexity
In a world of ever-evolving cyber threats, a unified, effective defence strategy is paramount, says Chester Wisniewski, Field CTO Applied Research at Sophos.