The double-edged sword of artificial intelligence in cyber security – Source: www.cybertalk.org

Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: For businesses and individuals, AI is nothing short of a game-changer. AI is also starting to have a profound influence on the offensive and defensive sides of cyber security. The symbiotic relationship...

What is a whaling attack? Definition, characteristics, best practices – Source: www.cybertalk.org

Source: www.cybertalk.org – Author: slandau By George Mack, Content Marketing Manager, Check Point In a landscape of evolving cyber threats, phishing attacks continue to cause devastating consequences for organizations around the world. Although it’s well known that...

How CBA Is Managing Cyber Security in an Age of ‘Infinite Signals’ – Source: www.techrepublic.com

Source: www.techrepublic.com – Author: Ben Abbott Image: Timon/Adobe Stock Andrew Pade took on the role of general manager of cyber defence operations and security integration at CBA just over three years ago. Yet in that time, according to Pade, the number of signals...

Microsoft, Apple versus China, spyware actors – Source: www.techrepublic.com

Source: www.techrepublic.com – Author: Karl Greenberg Image: 2ragon/Adobe Stock Revelations this week from Microsoft and Apple speak to the COVID-like persistence of cyber threats and the ability of threat actors to adapt in the wild, steal credentials and sidestep...