OpenAI built a text generator so good, it’s considered too dangerous to release
A storm is brewing over a new language model, built by non-profit artificial intelligence research company OpenAI, which it says is so good …
A storm is brewing over a new language model, built by non-profit artificial intelligence research company OpenAI, which it says is so good …
As organizations rush to adopt new digital channels, big data, advanced analytics, and emerging technologies such as blockchain, artificial …
As you are no doubt aware, 2018 was yet another banner year for cybercrime. IBM Security Vice President Caleb Barlow recently reflected on …
Virtually all companies like to say they take their customers’ privacy and security seriously, make it a top priority, blah blah. But …
The Pathé Gaumont Champs-Elysées cinema in Paris (Photo: Thomas van de Weerd, via Flickr/CC) Step one for not falling victim to business …
Black Hat organizers are excited to announce that the popular Executive Summit will return to Black Hat Europe in London next month! The …
As operational and security risks converge in the enterprise, the role of the chief information security officer (CISO) is evolving and …
Getting and keeping people on board with your information security systems is one of the toughest challenges you’ll face as a security …
This article is featured in the new DZone Guide to Cloud: Serverless, Functions, and …
This article is featured in the new DZone Guide to Security: Defending Your …
The DHS directive on email security has an approaching deadline that most departments in the executive branch might actually …
Business executives are significantly more optimistic about their organisations’ adoption of DevOps and security-focused DevSecOps …
All it took was access to a lawyer’s email, and suddenly, almost $532,000 was in the wrong hands. This business email compromise (BEC) …
Just about every chief information security officer (CISO) has a common objective when it comes to making a case for security: proving a …
The responsibilities of chief information security officers (CISOs) continue to grow and expand throughout the enterprise — and so has …
“Cybersecurity cannot be guaranteed, but a timely and appropriate reaction can,” noted a recent report from the Directors and Chief …
To gather insights on the current and future state of containers, we talked to executives from 26 companies. Here’s who we spoke …
Have you ever been in a situation where multiple adults are attempting to solve a problem, but a small child is the only voice of reason in …