The Challenge of Combatting Threats Against Autonomous Vehicles
By Joseph Hladik, Cyber Group Lead, Neya Systems From perception and sensing to mapping and localization, both off-road and on-road…
By Joseph Hladik, Cyber Group Lead, Neya Systems From perception and sensing to mapping and localization, both off-road and on-road…
The company focused heavily on data and system security in the announcement of its generative AI platform, Apple Intelligence, but…
Critical infrastructure is facing increasingly disruptive threats to physical processes, while thousands of devices are online with weak authentication and…
Amid surging attacks, Kenya aims to expand its technology sector and improve cybersecurity to protect the country's fast-growing digital economy.
Border Patrol has encountered nationals from China, Jordan, Turkey and Mauritania crossing the U.S. southern border illegally in May, sources…
The US government is warning that pro-Russian hacktivists are seeking out and hacking into unsecured operational technology (OT) systems used…
Dark Reading talks cloud security with John Kindervag, the godfather of zero trust.
The device management company introduced a Fleet Hardening Score and Privilege Escalation (the good kind) to its endpoint security platform…
By Wade Ellery, Field Chief Technology Officer at Radiant Logic Cyber threats such as ransomware, zero-day exploits, phishing and supply…
Pwn2Own Vancouver 2024 has ended with security researchers collecting $1,132,500 after demoing 29 zero-days (and some bug collisions). [...]