
Sam Curry
Articles
-
Dec 24, 2024 |
darkreading.com | Rob Sloan |Sam Curry
COMMENTARYDespite never-ending data breaches and ransomware attacks, too many companies still rely on the outdated "trust but verify" cybersecurity strategy. This approach assumes that any user or device inside a company's network can be trusted once it has been verified. The approach has clear weaknesses: Many businesses are putting themselves at additional risk by verifying once, then trusting forever.
-
Sep 6, 2024 |
techradar.com | Sam Curry
When researchers at software management company, JFrog, routinely scanned AI/ML models uploaded to Hugging Face earlier this year, the discovery of a hundred malicious models put the spotlight on an underrated category of cybersecurity woes: data poisoning and manipulation.
-
Sep 6, 2024 |
flipboard.com | Sam Curry
NowIn This Story As Intel INTC looks for options to fix its faltering business, another chipmaker is reportedly interested in buying some of its chip design units. Suggested Reading Toyota's EV targets were already low. Now they're getting slashed as hybrids rule Google has abused its power over the ad …
-
Jul 25, 2024 |
cloudsecurityalliance.org | Cloud Bytes Webinars |Sam Curry
Originally published by CXO REvolutionaries. Written by Sam Curry, VP & CISO in Residence, Zscaler.
-
Jul 15, 2024 |
securityboulevard.com | Wajahat Raja |Sam Curry
Recent news reports have brought to light a law enforcement operation codenamed MORPHEUS. The operation was conducted against the threat actors using the Cobalt strike tool as part of their attack infrastructure ...
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →