FYI
Insights on Technology and How We Use It
Zero Trust - Never Trust, Always Verify
Zero trust cybersecurity protocols may enable law firms and other organizations to create a more resilient protection network, but how do they get there?
Fighting Back Fast: Artificial Intelligence Comes to Cybersecurity
Recently, more than $240,000 was stolen by someone pretending to be an executive at a British energy company. This event does not seem all that out of the ordinary, except that the executive was not a real person. Thieves used voice-mimicking software in order to imitate the real executive. And they got away with it. This scam was enabled by artificial intelligence (AI) that was used to create a realistic deep-fake imitation. It is being called the world’s first AI heist.