Data Privacy & Security

Multi-Turn Attacks Reveal Flaws in Open-Weight LLMs
Infrastructure & Network Security Multi-Turn Attacks Reveal Flaws in Open-Weight LLMs

As we dive into the evolving landscape of artificial intelligence security, I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. With the recent revelations about

Whisper Leak: Side-Channel Attack Targets LLMs' Privacy
Data Protection & Privacy Whisper Leak: Side-Channel Attack Targets LLMs' Privacy

Unveiling a Hidden Threat in AI Interactions In an era where Large Language Models (LLMs) power countless personal and corporate interactions, a startling vulnerability has emerged that threatens the very privacy these systems promise to protect, raising serious concerns about security. Microsoft

How Does Samsung Knox Secure the Open Android Ecosystem?
Endpoint & Device Security How Does Samsung Knox Secure the Open Android Ecosystem?

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. With a particular focus on the Android ecosystem and Samsung Knox technologies, Rupert is here to unpack how this

Google's AI Big Sleep Uncovers Apple Safari Vulnerabilities
Malware & Threats Google's AI Big Sleep Uncovers Apple Safari Vulnerabilities

As we dive into the evolving world of cybersecurity, I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we’ll explore groundbreaking advancements in AI-driven

Are AI Browsers a Hidden Security Threat to Enterprises?
Data Protection & Privacy Are AI Browsers a Hidden Security Threat to Enterprises?

In a bustling corporate office, a seemingly harmless browser update rolls out across thousands of employee devices, promising smarter search capabilities and automated workflows, but unbeknownst to the IT team, this AI-enhanced tool quietly opens a backdoor for cybercriminals. Malicious

Turning Power Users into Cybersecurity Stewards with Training
Endpoint & Device Security Turning Power Users into Cybersecurity Stewards with Training

In the ever-evolving landscape of cybersecurity, understanding how to effectively train employees to become active defenders of their organizations is more critical than ever. Today, we’re thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later