In today’s fast-paced industrial landscape, the integration of advanced technologies in operational processes is no longer optional; it’s essential. DeepSeek stands at the forefront of this transformation, offering innovative solutions that enhance efficiency, safety, and productivity across various sectors. At its core, DeepSeek leverages cutting-edge artificial intelligence and machine learning algorithms to analyze vast amounts […]
AI
Smart Security Everywhere: Empowering CXOs with Always-On Protection
by Shantanu Bhattacharya Posted on February 20, 2025 | Originally published on RSAC Conference 🔗 Read the original article on RSAC Conference In today’s digital-first business landscape, Chief Experience Officers (CXO) are frequently on the move, driving business growth outside the organization’s secure network perimeter. However, this mobility comes with a significant risk: their laptops, […]
Cyber (In)Securities – Issue 126
Information Security News Ghost Ransomware Targets Orgs in 70+ CountriesDark Reading by Elizabeth MontalbanoGhost ransomware continues to pose a significant threat globally, now targeting organisations in over 70 countries. This ransomware variant is particularly insidious due to its ability to encrypt data swiftly and demand ransoms, leading to severe disruptions across multiple sectors. The widespread […]
Cyber (In)Securities – Issue 125
Information Security News Joint Letter on the UK Government’s use of Investigatory Powers Act to attack End-to-End EncryptionGlobal Encryption Coalition by Ryan Polk The Global Encryption Coalition is actively opposing the UK government’s utilisation of the Investigatory Powers Act to erode end-to-end encryption, asserting that this undermines both personal privacy and national security. An open […]
Cyber (In)Securities – Issue 122
Information Security News: TSA’s Airport Facial-Recog Tech Faces Audit ProbeThe Register by Brandon VigliaroloThe U.S. Transportation Security Administration’s (TSA) facial recognition program is under audit by the Government Accountability Office (GAO) due to concerns over privacy, data security, and potential biases. The audit will assess how biometric data is collected, stored, and shared, and whether […]
Beyond Data Protection Day: Safeguarding Our Digital Lives Every Day

January 28th was Data Protection Day—a global reminder that privacy isn’t just a legal formality or an operational headache. It’s a fundamental pillar of trust. If your business handles client or customer data (and let’s be honest, that includes almost every business these days), you have a responsibility to protect it. Yet, too many still […]
Cyber (In)Securities – Issue 121
Information Security News: US Cyber Agency’s Future Role in Elections Remains Murky Under the Trump Administration Security Week via Associated PressThe role of the US Cybersecurity and Infrastructure Security Agency (CISA) in safeguarding elections is increasingly uncertain under the Trump administration. While CISA played a key role in securing previous elections, its future involvement remains […]
Cyber (In)Securities – Issue 120
Information Security News US freezes foreign aid, halting cybersecurity defence and policy funds for alliesThe Register by Jessica LyonsRead more here The U.S. government has frozen foreign aid, including funds allocated to support allies’ cybersecurity defense and policy initiatives. This unexpected move could leave critical infrastructure in allied nations vulnerable, as many rely on U.S. […]
China’s Open-Source AI: The genie is out of the bottle, and the race is on
China’s AI ambitions have been making headlines for years, but recent developments have thrown a curveball into the global tech landscape. DeepSeek, a Chinese AI company, has managed to develop a top-tier AI model despite facing significant sanctions and restrictions. And here’s the kicker—it’s open source. While open-source AI isn’t new (META’s LLaMA models have […]
How EDR/XDR Technologies Enhance Data Privacy and Their Implications for AI Governance

In today’s digital world, data privacy has become a paramount concern for organizations and individuals alike. As cyber threats grow increasingly sophisticated, organizations turn to robust security solutions like Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) to safeguard sensitive data. Beyond their immediate role in mitigating cyber risks, these technologies also […]