Security | News, how-tos, features, reviews, and videos
AI red teaming offers an innovative, proactive method for strengthening AI while mitigating potential risks, helping organizations avoid costly AI incidents. Here’s how it works.
The security of genAI models is iffy and takes a back seat to other issues, but with developers increasingly using genAI for code, it needs to become a priority.
The Ultralytics AI library hack points to critical vulnerabilities in the Python ecosystem—but not where you might think. Here's what developers need to know.
Attackers exploited a script injection vulnerability via GitHub Actions to inject malicious code during the automated build process, poisoning the resulting packages of the popular Python library.
In this issue: We look at how IT leaders are reworking their cloud implementations for better fit to their needs, as well as how they can control cloud costs and ensure cloud security.
Iintegration with Entra ID brings identity-based access controls to the distribution and use of Windows Subsystem for Linux and Windows Package Manager in enterprises.
How can enterprises secure and manage the expanding ecosystem of AI applications that touch sensitive business data? Start with a governance framework.
OpenJDK proposals would provide Java implementations of a quantum-resistant module-latticed-based digital signature algorithm and key encapsulation mechanism.
Attackers gunning for supply chains again, deploying innovative blockchain technique to hide command & control.
To safeguard enterprise data in hybrid cloud environments, organizations need to apply basic data security techniques such as encryption, data-loss prevention (DLP), secure web gateways (SWGs), and cloud-access security brokers (CASBs). But such secu