Posted inBlog News Dangers of DeepSeek’s privacy policy: Data risks in the age of AI Posted by By Mehmed Saleem 11 February 2025 As AI technologies rapidly evolve and become more integrated into our daily lives, data privacy…
Posted inBlog News Key influences on the security job market Posted by By Mehmed Saleem 11 February 2025 Influences that shape both the job market as well as workplace dynamics continue to evolve.…
Posted inBlog News Unpacking data breaches: Insights from security experts Posted by By Mehmed Saleem 11 February 2025 Robert S. Mueller, III, former Director of the FBI, is quoted as saying, “There are…
Posted inBlog News Datenleck durch GenAI-Nutzung | CSO Online Posted by By Mehmed Saleem 10 February 2025 „Die Nutzung von KI durch die Mitarbeiter ist soweit fortgeschritten, dass die IT-Teams kaum aufholen…
Posted inBlog News Ransomware extortion rose by 46% in Q4 2024 Posted by By Mehmed Saleem 10 February 2025 According to a Nuspire report, ransomware extortion publications rose by 46% compared to Q3, with…
Posted inBlog News 29% of school systems report a rise in student-to-student security incidents Posted by By Mehmed Saleem 10 February 2025 A recent cybersecurity report by Clever found that 5% of U.S. school systems have implemented…
Posted inBlog News Hackers breach Microsoft IIS services using Cityworks RCE bug Posted by By Mehmed Saleem 10 February 2025 Hackers are exploiting a high-severity remote code execution (RCE) flaw in Cityworks deployments — a…
Posted inBlog News Why cyber hygiene remains critical in the era of AI-driven threats Posted by By Mehmed Saleem 10 February 2025 Cyber-attacks are an assumed inevitable for businesses today. As companies increasingly handle large amounts of…
Posted inBlog News Fortifying cyber security: What does secure look like in 2025? Posted by By Mehmed Saleem 10 February 2025 The evolving cybersecurity landscape has increased security pressures for IT leaders. With the World Economic…
Posted inBlog News Nearly 10% of employee gen AI prompts include sensitive data Posted by By Mehmed Saleem 10 February 2025 Enterprise LLM use falls into three broad categories:sanctioneddeployments, including licensed and in-house developed implementations; shadow…