Articles

  • Dec 24, 2024 | darkreading.com | Rob Sloan |Sam Curry

    COMMENTARYDespite never-ending data breaches and ransomware attacks, too many companies still rely on the outdated "trust but verify" cybersecurity strategy. This approach assumes that any user or device inside a company's network can be trusted once it has been verified. The approach has clear weaknesses: Many businesses are putting themselves at additional risk by verifying once, then trusting forever.

  • Sep 6, 2024 | techradar.com | Sam Curry

    When researchers at software management company, JFrog, routinely scanned AI/ML models uploaded to Hugging Face earlier this year, the discovery of a hundred malicious models put the spotlight on an underrated category of cybersecurity woes: data poisoning and manipulation.

  • Sep 6, 2024 | flipboard.com | Sam Curry

    NowIn This Story As Intel INTC looks for options to fix its faltering business, another chipmaker is reportedly interested in buying some of its chip design units. Suggested Reading Toyota's EV targets were already low. Now they're getting slashed as hybrids rule Google has abused its power over the ad …

  • Jul 25, 2024 | cloudsecurityalliance.org | Cloud Bytes Webinars |Sam Curry

    Originally published by CXO REvolutionaries. Written by Sam Curry, VP & CISO in Residence, Zscaler.

  • Jul 15, 2024 | securityboulevard.com | Wajahat Raja |Sam Curry

    Recent news reports have brought to light a law enforcement operation codenamed MORPHEUS. The operation was conducted against the threat actors using the Cobalt strike tool as part of their attack infrastructure ...

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →