AI-driven cyber attacks top risk for enterprises, says report, ET CIO New Delhi, Nov 3 (IANS) Artificial intelligence (AI)-driven malicious attacks were the top emerging cyber-security risk for enterprises in the third quarter of 2024, according to a new report. Artificial intelligence (AI)-driven malicious attacks were the top emerging cyber-security risk for enterprises in the third quarter of 2024, according ...
Read More »Demo Blog With Map
Chinese researchers develop AI model for military use on back of Meta’s Llama –
Chinese researchers develop AI model for military use on back of Meta’s Llama – China AI Military Use has raised global alarms after reports revealed that Chinese researchers linked to the People’s Liberation Army (PLA) adapted Meta’s Llama model for military AI applications. According to a Reuters investigation, the PLA’s Academy of Military Science (AMS) used Meta’s open-source Llama 2 ...
Read More »IT hardware companies may require global certification, CIO News, ET CIO
IT hardware companies may require global certification, CIO News, ET CIO The government may ask laptop, server and other IT hardware importers to provide an international certification attesting that their product is from a trusted source before allowing a licence-free import of it, people in the know of the matter told ET. This certification, one of the people said, could ...
Read More »Sam Altman’s rebranded Worldcoin ramps up iris-scanning crypto project –
Sam Altman’s rebranded Worldcoin ramps up iris-scanning crypto project – Worldcoin, the ambitious cryptocurrency project founded by OpenAI CEO Sam Altman, has officially rebranded to World Network, signaling a bold new phase of global expansion. The company is intensifying efforts to scale its iris-scanning identity system, known as World ID, which aims to distinguish real humans from AI entities online. ...
Read More »Cisco launches Secure Networking approach in India, CIO News, ET CIO
Cisco launches Secure Networking approach in India, CIO News, ET CIO Cisco has launched its Secure Networking approach in India, an innovative offer that combines advanced capabilities of networking and cybersecurity. The offer is built on the concept of zero trust to provide businesses with seamless and secure connectivity to tackle the risks of cybersecurity in a hybrid world. Amid ...
Read More »CISOs unpack API security strategy to secure digital transformation efforts –
CISOs unpack API security strategy to secure digital transformation efforts – API Security has become a central focus for Chief Information Security Officers (CISOs) driving India’s digital transformation. As APIs power mobile apps, e-commerce, and enterprise automation, they also present major cybersecurity risks—from API sprawl to shadow APIs. To counter these challenges, leaders are deploying Zero Trust models, advanced ...
Read More »Major AI models not very transparent, says report, ET CIO
Major AI models not very transparent, says report, ET CIO Artificial intelligence (AI) based foundations models such as Meta’s Llama 2 and OpenAI’s GPT-4 are low on transparency, according to a global report. The Foundation Model Transparency Index created by a group of eight AI researchers from Stanford University, MIT Media Lab, and Princeton University, tracked 10 most popular AI ...
Read More »Government issues ‘high risk’ warning for Microsoft Windows users –
Government Issues High-Risk Warning for Microsoft Windows Users The Indian Computer Emergency Response Team (CERT-In) has sounded the alarm for all Microsoft Windows users in India. In its recent advisory, CERT-In disclosed multiple high-severity vulnerabilities across several Microsoft products, including: Microsoft Windows Microsoft Office Microsoft Azure Developer Tools Microsoft SQL Server The vulnerabilities could enable attackers to gain elevated privileges, ...
Read More »Upgrading beyond AD and PIM solutions, CIO News, ET CIO
Upgrading beyond AD and PIM solutions, CIO News, ET CIO Amit Chaudhury, VP & Practice Head – Cloud and Security, Bharti Airtel Every company has to keep its data and resources secure. It’s about time they try something new instead of the usual solutions like Active Directory (AD) and Privileged Identity Management (PIM). This is where identity governance steps in. ...
Read More »The digital heist: Strategies for remediating supply chain attacks –
The digital heist: Strategies for remediating supply chain attacks – Supply Chain Cyber Attacks are redefining modern cybersecurity, turning digital trust into the new battleground. As organizations expand their digital ecosystems, attackers are targeting weak links within software, hardware, and vendor networks. According to the ETCISO Annual Conclave 2024, industry leaders have emphasized the urgent need for unified defense and ...
Read More »
Firewall Support Company in India All type of Firewalls Support Provider Company in India











