Geek-Guy.com

Author: Sue Poremba

We’re Entering the Age of Unethical Voice Tech

In 2019, Google released a synthetic speech database with a very specific goal: stopping audio deepfakes.  “Malicious actors may synthesize speech to try to fool voice authentication systems,” the Google News Initiative blog reported at the time. “Perhaps equally concerning, public awareness of “deep fakes” (audio or video clips generated by deep learning models) can […]

The post We’re Entering the Age of Unethical Voice Tech appeared first on Security Intelligence.

9 Factors to Consider Before Choosing a UEM Solution

The more of your employees who work remotely some or all of the time, the more devices they’re likely to use to conduct business. Employees use their own devices as well as corporate ones, making already-challenged cybersecurity systems more complex. In response, IT teams need to rethink their approach to endpoint management. Changes in endpoint […]

The post 9 Factors to Consider Before Choosing a UEM Solution appeared first on Security Intelligence.

Unified Endpoint Management and Security: Thriving in a Work-From-Anywhere World

The hybrid workplace is here for the long-term, if not forever. Workers like the flexibility, and there are a lot of positives for business leaders in restructuring where and how people go about their jobs.  As much as workers like the hybrid workplace, it presents new challenges to security and IT teams. Management and security […]

The post Unified Endpoint Management and Security: Thriving in a Work-From-Anywhere World appeared first on Security Intelligence.

Who Is Legally Responsible for a Cyber Incident?

After a company discovers a cyber attack on its network, the finger-pointing begins. The CEO blames the chief information security officer (CISO). The CISO blames the financial officers for not setting aside enough money for cyber defenses. The chief information officer begins to look for a scapegoat further down the supply chain. Maybe they fire […]

The post Who Is Legally Responsible for a Cyber Incident? appeared first on Security Intelligence.

Looking for Cyber Insurance? Know Your Eligibility

Before leaving on an extended (and expensive) vacation, I bought travel insurance. I wanted to protect myself in case I or my traveling partner tested positive for COVID-19. I had to answer a number of questions about my eligibility for such insurance before they would approve me. Nor did the insurance come cheap, but I […]

The post Looking for Cyber Insurance? Know Your Eligibility appeared first on Security Intelligence.

Protecting Your Data From a Unique Threat: Misinformation

It’s the target for attackers. It drives unique insights and innovation. Data is the most valuable asset your organization has. Now, more than ever before, your company’s information faces a unique threat — one for which many cybersecurity teams aren’t prepared — misinformation. The value of data isn’t lost on most cybersecurity leaders, but data […]

The post Protecting Your Data From a Unique Threat: Misinformation appeared first on Security Intelligence.

Starting From Scratch: How to Build a Small Business Cybersecurity Program

When you run a small business, outsourcing for services like IT and security makes a lot of sense. While you might not have the budget for a full-time professional on staff to do these jobs, you still need the services. However, while it might be helpful to have a managed service provider handle your software […]

The post Starting From Scratch: How to Build a Small Business Cybersecurity Program appeared first on Security Intelligence.