Security
SecurityGenerative AI in Security: Risks and Mitigation Strategies
Microsoft’s Siva Sundaramoorthy provides a blueprint for how common cyber precautions apply to generative AI deployed in and around security systems.
Microsoft’s Siva Sundaramoorthy provides a blueprint for how common cyber precautions apply to generative AI deployed in and around security systems.
A VPN (virtual private network) encrypts your internet traffic and protects your online privacy. Find out how it works and why you should use it.
The Cybersecurity and Infrastructure Security Agency and Federal Bureau of Investigation assert that C, C++, and other memory-unsafe languages contribute to potential security breaches.
Discover how AI amplifies cloud security risks and how to mitigate them, with insights from Tenable’s Liat Hayun on managing data sensitivity, misconfigurations, and over-privileged access.
Read more about a joint operation between several law enforcement agencies across the globe to tackle RedLine Stealer and META malware.
The Hacker-Powered Security Report showed mixed feelings toward AI in the security community, with many seeing leaked training data as a threat.
There are a great many vulnerability management tools available. But which is best? Here are our top picks for a variety of use cases.
AI-enhanced malicious attacks are a top concern for 80% of executives, and for good reason, as there is a lot of evidence that bad actors are exploiting the technology.
Read more about DNS hijacking and how organizations can prevent it.
A VPN (virtual private network) encrypts your internet traffic and protects your online privacy. Find out how it works and why you should use it.
If you want to pursue a path toward becoming a CIO, here's your guide to salaries, job markets, skills and common interview questions.
About a year after Broadcom’s acquisition of VMware, the company released VMware Tanzu Data Services to make connections to some third-party data engines easier.
This is a comprehensive list of the best encryption software and tools, covering their features, pricing and more. Use this guide to determine your best fit.
NordVPN or ExpressVPN? Read this in-depth comparison to find out which VPN provider comes out on top in terms of features, security, speed, and more.
The Cybersecurity and Infrastructure Security Agency and Federal Bureau of Investigation assert that C, C++, and other memory-unsafe languages contribute to potential security breaches.
Discover how AI amplifies cloud security risks and how to mitigate them, with insights from Tenable’s Liat Hayun on managing data sensitivity, misconfigurations, and over-privileged access.
A great way to stay current with the latest technology trends and innovations is by attending conferences. Read and bookmark our tech events guide.
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
Russian hackers, known as Midnight Blizzard, launch targeted spear-phishing on U.S. officials, exploiting RDP files to gain access to data.
A passkey is a security measure used to grant access to a protected system. This guide explains how it works, and provides more information on its uses and benefits.