Tag Microsoft

Reimagining Cybersecurity in the Era of AI

Securing the Human Layer: A Critical Imperative in Cybersecurity Recent findings from Verizon’s 2024 Data Breach Investigations Report have highlighted a pressing issue within cybersecurity: human error remains a major catalyst in data breaches, underscoring the necessity to secure the human layer in organizational defenses. The report reveals that human…

Read MoreReimagining Cybersecurity in the Era of AI

Tech Giants and Utility Companies Launch AI Consortium

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Formation of Open Power AI Consortium with Major Tech Players Rashmi Ramesh (rashmiramesh_) • March 21, 2025 Image: Shutterstock In a significant development, several prominent technology and utility companies announced the formation of an alliance aimed at leveraging artificial intelligence…

Read MoreTech Giants and Utility Companies Launch AI Consortium

Ways to Sidestep US-Based Digital Services—and Reasons to Consider It

Big Tech Dynamics and Data Privacy in the Trump Era Recent requests from law enforcement agencies for user data from major tech companies such as Apple, Google, and Meta have highlighted the pivotal role these corporations play in determining government access to personal information, including sensitive location data. Consequently, the…

Read MoreWays to Sidestep US-Based Digital Services—and Reasons to Consider It

UK NCSC Establishes 2035 Target for Transition to Post-Quantum Security

Critical Infrastructure Security, Encryption & Key Management, Security Operations Cyber Agency Urges Critical Infrastructure Operators to Meet Post-Quantum Encryption Deadline Akshaya Asokan (asokan_akshaya) • March 19, 2025 Image: Shutterstock The UK’s National Cyber Security Centre (NCSC) is urging critical infrastructure operators to transition to post-quantum cryptography by 2035. This call…

Read MoreUK NCSC Establishes 2035 Target for Transition to Post-Quantum Security

Top 10 Passwords Hackers Exploit to Access RDP – Is Your Password Vulnerable?

A recent study conducted by the Specops research team highlights the ongoing exploitation of weak passwords by cybercriminals targeting Remote Desktop Protocol (RDP) ports. The research revealed over 85 million compromised passwords that will be integrated into Specops’ Breached Password Protection service, sourced from a combination of honeypot networks and…

Read MoreTop 10 Passwords Hackers Exploit to Access RDP – Is Your Password Vulnerable?

Exposing DevOps Vulnerabilities: An Analysis of Over 502 Incidents and 955 Hours of Disruption Across GitHub, GitLab, Atlassian, and Azure DevOps

Over the past year, there have been a staggering 502 security incidents across major platforms, including 48 categorized as high-risk, leading to a combined total of 955 hours of significant and critical interruptions—equivalent to an astonishing 120 business days. These findings come from ‘The DevOps Threats Unwrapped’ report, compiled by…

Read MoreExposing DevOps Vulnerabilities: An Analysis of Over 502 Incidents and 955 Hours of Disruption Across GitHub, GitLab, Atlassian, and Azure DevOps