Category: Technology & Infrastructure

Tetragon: Extending eBPF and Cilium to runtime security

Cilium subproject taps eBPF hooks into the Linux kernel to bring real-time security observability and…

Avoiding the cloud migration graveyard

Don’t let your cloud journey die. Discover how to overcome common challenges to accomplish genuine…

Java proposals would boost resistance to quantum computing attacks

OpenJDK proposals would provide Java implementations of a quantum-resistant module-latticed-based digital signature algorithm and key…

A GRC framework for securing generative AI

How can enterprises secure and manage the expanding ecosystem of AI applications that touch sensitive…

Supply chain compromise of Ultralytics AI library results in trojanized versions

Attackers exploited a script injection vulnerability via GitHub Actions to inject malicious code during the…

Weaponizing generative AI

The security of genAI models is iffy and takes a back seat to other issues,…

The vital role of red teaming in safeguarding AI systems and data

AI red teaming offers an innovative, proactive method for strengthening AI while mitigating potential risks,…

Secure AI? Dream on, says AI red team

Microsoft’s ethical AI hackers provide some answers — as well as more questions. Credit: Who…

CISA publishes security goals for software development process, product design

IT sector-specific goals to protect against cyber threats include 11 for more secure software development…

The AI security tsunami

Harnessing the power of AI is essential for modern cloud security because AI is also…