
how to combat generative AI deepfakes on blockchain—comments from Steinberg
23 June 2023 by Lou Steinberg, founder of cyber research lab CTM Insights
EU’s PEGA Committee Adopts 8 Recommendations on Telecom Networks
20 June 2023 by Enea
Operational Budget Challenges Bring Uplift to OT Risk Management, says Radiflow
19 June 2023 by Radiflow
Expert Delinea Comment: US Government Clop Bounty
19 June 2023 by Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea
COMMENT: Over 2 millions uni credentials breached
16 June 2023 by Marc Jacob Andy Robertson, Head of Fujitsu Cyber Security, Fujitsu UK&I
WithSecure: US Energy Dept. and others affected by MOVEit security flaw
16 June 2023 by Timothy West, Head of Threat Intelligence, WithSecure
92% of Devs Using AI Coding Tools: Checkmarx Comment
15 June 2023 by Checkmarx
WithSecure Comment: EU officials pass draft law to regulate AI and ban facial recognition systems
15 June 2023 by WithSecure™
AI Act: EU Lawmakers Abandon Risk-Based Approach, Start Final Negotiations
14 June 2023 by CCIA Europe’s Policy Manager, Boniface de Champris
Why Global Mass Deployment of Biometric Payment Cards is Coming
12 June 2023 by Robert Puskaric, CEO of Zwipe
Hackuity Comment: CISA adds critical vulnerability in MOVEit file transfer software
5 June 2023 by Sylvain Cortes, Hackuity VP Strategy & 17x Microsoft MVP
Deepfake doppelgangers could fatally undermine the influencer industry, say experts
5 June 2023 by Stevie Johnson, managing director of Disrup
WithSecure Comment: Major Spanish lender dealing with Ransomware attack
5 June 2023 by Timothy West, Head of Threat Intelligence, WithSecure
The Power of Access Control: Exploring Advanced Features for Enhanced Security
4 June 2023 by Matrix
The Picture in Picture Attack
1 June 2023 by Jeremy Fuchs, Cybersecurity Researcher/Analyst at Avanan, A Check Point Software Company
Trusted Connectivity Alliance Updates eSIM Specification to Support Secure and Seamless IoT Remote SIM Provisioning
31 May 2023 by The Trusted Connectivity Alliance (TCA)
Is Data security the new Cybersecurity?
30 May 2023 by Mark Semenenko, Director Solutions Architecture, Immuta
The Truth About Face Recognition Technology: Separating Reality from Myth
26 May 2023 by Matrix Comsec
Comment: ’living off the land’ threat to U.S. critical infrastructure (Five Eyes report)
25 May 2023 by Toby Lewis, Global head of threat analysis de Darktrace
SANS Institute and Kuwait Institute of Banking Studies Forge Powerful Partnership to Fortify Cybersecurity Education in Kuwait
25 May 2023 by Marc Jacob
Mimecast comment: GDPR Anniversary
25 May 2023 by Dr Francis Gaffney, Senior Director, Threat Intelligence and Future Engineering at Mimecast
GDPR Insights/Comment - Hackuity, Delinea, WithSecure
25 May 2023 by Experts
Ping Identity’s reaction to 5th GDPR anniversary
25 May 2023 by Rob Otto, EMEA field CTO at Ping Identity
COMMENT: GDPR turns 5
24 May 2023 by Experts
Securing the IoT: SESIP or Common Criteria? That is not the question
24 May 2023 by Carlos Serratos, GlobalPlatform Security Task Force Co-Vice-Chair
Shattered Trust: Ledger’s New Recovery Feature Stirs Up Crypto Security Concerns
24 May 2023 by David Carvalho Co-Founder & CEO Naoris Protocol
Awareness is Key: Educating Executives on Cybersecurity Risks in Healthcare
23 May 2023 by Anis Trabelsi
Your podcast HereNew, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr
All new podcasts