Cybersecurity

New method efficiently safeguards sensitive AI training data
Data privacy comes with a cost. There are security techniques that protect sensitive user data, like customer addresses, from attackers who may attempt to extract them from AI models — but they often make those models less accurate. MIT researchers recently developed a framework, based on a new privacy metric called PAC Privacy, that could…

Beyond encryption: Why quantum computing might be more of a science boom than a cybersecurity bust
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Last August, the National Institute of Standards and Technology (NIST) released the first three “post-quantum encryption standards” designed to withstand an attack from a quantum computer. For years, cryptography experts have worried that the advent of…

Making a case for the cybersecurity data fabric | TechTarget
Information, data and context are the weapons that cybersecurity teams use to battle adversaries daily. Yet, using cybersecurity data in the modern enterprise has become increasingly difficult. The data is often scattered among dozens of point technologies, fragmented with use-case-specific interfaces, and siloed between IT, security and application teams with little capability to support…

Cybersecurity jobs available right now in the USA: March 20, 2025 – Help Net Security
AI Security Architect Verizon | USA | Hybrid – View job details As an AI Security Architect, you will ensure security architecture reviews are integrated into Verizon’s AI development lifecycle. This includes embedding robust security measures from design to deployment, conducting risk assessments on AI models, and implementing security tools and protocols in AI/ML operations….

Cybersecurity and AI: What does 2025 have in store?
In the hands of malicious actors, AI tools can enhance the scale and severity of all manner of scams, disinformation campaigns and other threats 15 Jan 2025 • , 5 min. read AI has supercharged the cybersecurity arms race over the past year. And the coming 12 months will provide no respite. This has major…

Cybersecurity in Crypto: Best Practices to Prevent Theft and Fraud
Cybersecurity tips to protect your cryptocurrency from hackers, scams, and fraud. Learn best practices for securing digital assets and staying safe online. The cryptocurrency market is changing and growing daily, with new coins created weekly. While the broader market is struggling with weak demand and remains at a critical juncture, Cardano’s ADA is among the…

Should You Replace Your TP-Link Router? We Asked 4 Cybersecurity Experts to Weigh In
It’s not every day a humble Wi-Fi router makes an appearance in the halls of Congress. But that’s exactly what happened on March 5 when Rep. Raja Krishnamoorthi, a Democrat from Illinois, held up a TP-Link router and said, “Don’t use this.” Krishnamoorthi has been urging a ban of the routers for months in response…

The Trump Administration Is Deprioritizing Russia as a Cyber Threat
As scam compounds in Southeast Asia continue to drive massive campaigns targeting victims around the world, WIRED took a deeper look at how Elon Musk’s satellite internet service provider Starlink is keeping many of those compounds in Myanmar online. Meanwhile, FTC complaints obtained by WIRED allege that an “OpenAI” job scam used Telegram to recruit…

Quantifying ROI: Understanding the impact of cybersecurity products and services on cyber insurance claims
Cyber insurance claim values are an effective way to quantify the impact of cyberattacks on organizations. A higher claim value indicates that the victim experienced considerable financial and operational consequences from the attack, while a low claim value reflects limited disruption. Reducing the value of cyber insurance claims is to everyone’s advantage. For clients, lower…

Beyond the hype: The business reality of AI for cybersecurity
AI is firmly embedded in cybersecurity. Attend any cybersecurity conference, event, or trade show and AI is invariably the single biggest capability focus. Cybersecurity providers from across the spectrum make a point of highlighting that their products and services include AI. Ultimately, the cybersecurity industry is sending a clear message that AI is an integral…