confidential computing
Confidential Computing: How Big Tech Companies Are Coming Together To Secure Data At All Levels

Data today moves constantly from on-premises to public cloud and the edge, which is why…

Black Hat Security Conference
5 Biggest Cybersecurity Updates From Black Hat 2019 You Should Know

The biggest event for hackers concluded in Las Vegas last week. During the conference, there…

SWAPGS Vulnerability
SWAPGS Speculative Execution Vulnerability: How Close Are Hackers To Stealing Your Data?

Researchers from Bitdefender say Intel’s x86 and x64 are prone to SWAGS speculative execution vulnerability.…

Bad USBs Are The Reason Why You Shouldn’t Plug Just About Anything Into Your PC

It is common operational security practice to not plug unverified or potentially unsafe USB drives…

More than 1,00,000 people are subscribed to our newsletter

Subscribe now to receive in-depth stories on AI & Machine Learning.