Geek-Guy.com

Category: Emerging Tech

TSA extends cyber requirements for pipeline owners

The Transportation Security Administration is locking in a pair of pipeline directives for additional years ahead of the looming White House transition. In a posting to the Federal Register on Friday, the Department of Homeland Security component said it ratified the Security Directive Pipeline-2021-01 series and the Security Directive Pipeline-2021-02 series and would extend the…

Biden cyber executive order gets mostly plaudits, but its fate is uncertain

A sweeping executive order on cybersecurity released Thursday won largely positive reviews, with the main question being its timing — and what will come of it with the executive branch set to be handed over from president to president. Chris Inglis, the former national cyber director for Joe Biden who has served under both Democrats…

Cisco’s homegrown AI to help enterprises navigate AI adoption

As the world rushes to integrate AI into all aspects of enterprise applications, there’s a pressing need to secure data-absorbing AI systems from malicious interferences. To achieve that, Cisco has announced Cisco AI Defense, a solution designed to address the risks introduced by the development, deployment, and usage of AI. According to Tom Gillis, SVP…

Fifteen Best Practices to Navigate the Data Sovereignty Waters

Fifteen Best Practices to Navigate the Data Sovereignty Waters josh.pearson@t… Tue, 01/14/2025 – 08:04 Data sovereignty—the idea that data is subject to the laws and regulations of the country it is collected or stored in—is a fundamental consideration for businesses attempting to balance harnessing the power of data analytics, ensuring compliance with increasingly stringent regulations,…

LemFi moves remittances further into Asia and Europe with $53M in new funding

For many emerging market economies, remittances have become a lifeline. Inflows surpassed $669 billion in 2023, according to World Bank research, and they now represent significant portions of GDP in these countries, often outpacing foreign direct investment as the primary source of foreign exchange.  Traditional banks and agents maintain a firm grip on the remittance…

Accenture Releases New Report on AI and Autonomy

Global professional services company Accenture made several announcements to coincide with CES 2025. Among these announcements is the release of the Technology Vision 2025 research report, which highlighted AI and autonomy as key areas of development this year. According to the report, leaders in 2025 should “prepare for an imminent world in which AI is…

Six Tech Trends Shaping the Future of Brand Experiences

Six Tech Trends Shaping the Future of Brand Experiences madhav Wed, 01/08/2025 – 12:38 Business success relies on balancing positive brand experiences and maintaining consumer trust. Consumers want efficiency—2024 research from Thales found that 22% of consumers will give up after less than a minute if they’re having a frustrating customer experience—but they are suspicious…

These Are the Members of Congress Who Are Trading Crypto

Three weeks after Donald Trump’s reelection victory sent cryptocurrencies on a bull run, Rep. Mike Collins, R-Ga., spotted an opportunity. Collins started buying thousands of dollars’ worth of a meme coin called Ski Mask Dog. His legally mandated disclosure of those purchases helped drive the coin’s price up more than 100 percent. The purchases once…

A Day in the Life of a Prolific Voice Phishing Crew

Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never reach out unbidden to users this way. However, new details about the internal operations of a prolific voice phishing gang show the group routinely abuses legitimate services at Apple and Google to force a variety…

White House launches cybersecurity label program for consumers

The White House announced Tuesday the official launch of the U.S. Cyber Trust Mark, a cybersecurity labeling initiative aimed at enhancing the security of internet-connected devices.  The initiative tackles rising consumer concerns about the security vulnerabilities of “smart” devices essential to modern homes. As households become more dependent on interconnected gadgets — with a 2023…

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in minutes

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity landscape is evolving as attackers harness the power of artificial intelligence (AI) to develop advanced and evasive threats. The rise of AI-generated malware and AI-enhanced cyberattacks has escalated the threat…

Exit interview: FCC’s Jessica Rosenworcel discusses her legacy on cybersecurity, AI and regulation

On Jan. 20, Jessica Rosenworcel will leave the Federal Communications Commission, capping off a 12-year tenure that saw her rise from commissioner to chairwoman in 2021. Under her leadership, the agency has taken an aggressive approach to regulating cybersecurity, data privacy and emergent artificial intelligence use in the communications sector. Over the past four years,…

Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them

In the past year, cross-domain attacks have gained prominence as an emerging tactic among adversaries. These operations exploit weak points across multiple domains – including endpoints, identity systems and cloud environments – so the adversary can infiltrate organizations, move laterally and evade detection. eCrime groups like SCATTERED SPIDER and North Korea-nexus adversaries such as FAMOUS

Innovation in API Security: What’s New

So, What’s the Deal with Recent API Security Innovations? As companies across the spectrum of industries including finance, healthcare, travel, and more intensify their adoption of digital technologies, there’s an undeniable need for robust security measures to protect their assets in the cloud. More than ever, Non-Human Identities (NHIs) and Secrets Security Management are emerging…

7 biggest cybersecurity stories of 2024

Cybersecurity headlines were plenty this year, with several breaches, attacks, and mishaps drawing worldwide attention. But a few incidents in particular had far-reaching consequences, with the potential to reshape industry protections, shake up how vendors secure customers’ systems, or drive security leaders to reassess their strategies. Longer-term trends such as increased cybersecurity regulations and the…

Top 10 Cybersecurity Trends to Expect in 2025

The 2025 cybersecurity landscape is increasingly complex, driven by sophisticated cyber threats, increased regulation, and rapidly evolving technology. In 2025, organizations will be challenged with protecting sensitive information for their customers while continuing to provide seamless and easy user experiences. Here’s a closer look at ten emerging challenges and threats set to shape the

Cybersecurity Snapshot: CISA Hands Down Cloud Security Directive, While Threat from North Korean IT Workers Gets the Spotlight

Check out the new cloud security requirements for federal agencies. Plus, beware of North Korean government operatives posing as remote IT pros. Also, learn how water plants can protect their HMIs against cyberattacks. And get the latest on the U.S. cyber incident response framework; the CIS Benchmarks; and local and state governments’ cyber challenges. Dive…

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

Continuing our look back at 2024, part two of Last Watchdog’s year-ender roundtable turns its focus to emerging threats vs. evolving defense tactics. Part two of a four-part series The explosion of AI-driven phishing, insider threats, and business logic abuse … (more…) The post LW ROUNDTABLE — How 2024’s cyber threats will transform the security…

Data Security Predictions for 2025: Putting Protection and Resilience at Center Stage

Data Security Predictions for 2025: Putting Protection and Resilience at Center Stage madhav Tue, 12/17/2024 – 05:10 Cybersecurity is a remarkably dynamic industry. New trends, technologies, and techniques reshape the landscape at an extraordinary pace, meaning keeping up can be challenging. Protecting data, the driving force of modern businesses, will continue to be the primary…

Guarding against AI-powered threats requires a focus on cyber awareness

Threat actors will always find nefarious uses for new technologies, and AI is no exception. Attackers are primarily using AI to enhance the volume and velocity of their attacks. They’re also using the technology to make phishing communications more believable with perfect grammar and context-aware personalization. As cybercriminals harness new technologies to advance their operations,…

Top Cybersecurity Trends to Watch Out For in 2025

As we approach 2025, the cybersecurity landscape is evolving rapidly, shaped by technological advancements, regulatory shifts, and emerging threats. To keep up, organizations must stay ahead of these developments. Below is an exhaustive list of key cybersecurity trends to watch out for in 2025. For cybersecurity leaders and organizations, staying ahead of cybersecurity industry trends…

CyberArk Launches FuzzyAI to Test AI Models for Security Risks

Identity security solution vendor CyberArk has launched its new tool designed to test AI models and determine potential security issues before problems arise. CyberArk said in a press release announcing FuzzyAI that the tool has jailbroken every model it tested, pointing to significant flaws across AI adoption, leaving organizations vulnerable as they utilize emerging technologies.…

Closer to the Edge: Hyperscaling Have I Been Pwned with Cloudflare Workers and Caching

I’ve spent more than a decade now writing about how to make Have I Been Pwned (HIBP) fast. Really fast. Fast to the extent that sometimes, it was even too fast: The response from each search was coming back so quickly that the user wasn’t sure if it was legitimately checking subsequent addresses they entered…

From Passwords to Passkeys: A Secure Future for Business Authentication

Today’s businesses rely heavily on online systems and remote access, making robust authentication super important. Passwords, the traditional method of authentication, are becoming increasingly vulnerable to cyberattacks due to phishing scams, data breaches, and password fatigue.  In this article, we’ll explore the transition from passwords to passkeys, a more secure and user-friendly authentication method that…

WordPress Appliance - Powered by TurnKey Linux