A Chinese hacker group, GTG-1002, used AI in a groundbreaking cyber attack, marking the first AI-driven espionage. The attack ...
As global cybersecurity threats continue to evolve, so does the urgency to stay ahead. And it’s within this climate of ...
The 54 winning counties in this year’s survey are incorporating community feedback into their plans, ensuring responsible AI use, maturing their data programs and navigating challenges without ...
The 54 winning counties in this year’s survey are incorporating community feedback into their plans, ensuring responsible AI use, maturing their data programs and navigating challenges without ...
The files are many, and have two things in common —that the Office of the Auditor-General shouted itself hoarse about weak ...
Supply chain compromise is fast becoming a key attack vector for adversaries targeting operational technology (OT). These threats are no longer limited to theoretical discussions or isolated cases.
According to a Saturday announcement from the Office of Information Technology (OIT), the breach occurred after outside ...
The emergence of autonomous cyber operations marks a turning point. While the GTG-1002 campaign was intercepted, the ...
Shri Jitin Prasada, in his inaugural address, highlighted India’s leadership in building digital public infrastructures that ...
The information and communications technology arm of the PLDT Group was named a Microsoft Solutions partner for security, ...
Drawing on a background in law, public policy and cybersecurity program leadership, Judith Borts brings a wide-angle view to ...
US Government Shutdown ends opening the doors for Microsoft Government G5 to be the essential access for compliance and ...