Friendly Fire: When Attacking Yourself is the Best Defense

Nefarious actors are using machine learning to create deepfake voices, synthetic audio creations that have the same vocal, intonation, and pacing structure as an individual you may know very well.
Sounds Like Trouble: The Deepfake Voice Dilemma

Nefarious actors are using machine learning to create deepfake voices, synthetic audio creations that have the same vocal, intonation, and pacing structure as an individual you may know very well.
Gone Phishing: How Hackers Hooked Millions

Large-scale gatherings, such as fireworks displays, concerts, and sporting events, have long been considered attractive targets for lone actors or extremist groups. Expect increased patrols, bag checks, and drone surveillance in major metro areas.
Don’t Get Hooked: How to Identify Text-based ‘Phishing’ and Cybersecurity Tips to Stay ‘Reel’ Safe!

Why integration of cyber and physical security is a necessity for any industry that handles hazardous materials.
UK Office for Nuclear Regulation ‘Melts-down’ Over Safety Concerns

Why integration of cyber and physical security is a necessity for any industry that handles hazardous materials.