T-Mobile reaches $31.5 million settlement with FCC over past data breaches 

The telecom will pay half in the form of a fine, while the other half will serve as a down payment for improvements to data security and cybersecurity.

The post T-Mobile reaches $31.5 million settlement with FCC over past data breaches  appeared first on CyberScoop.

Continue reading T-Mobile reaches $31.5 million settlement with FCC over past data breaches 

Microsoft revised the controversial Copilot+ Recall feature

Microsoft has made changes to Recall – the screenshot-taking, AI-powered search feature for Copilot+ PCs running Windows 11 – to reassure users worried about security and privacy. The security of the feature has been assessed by Microsoft&#… Continue reading Microsoft revised the controversial Copilot+ Recall feature

Businesses turn to private AI for enhanced security and data management

In this Help Net Security interview, Joe Baguley, CTO EMEA at Broadcom, shares insights on private AI and its significance in data security. He explains how it helps organizations maintain control over sensitive information while addressing the complex… Continue reading Businesses turn to private AI for enhanced security and data management

New MIT protocol protects sensitive data during cloud-based computation

Deep-learning models have found applications across various industries, from healthcare diagnostics to financial forecasting. However, their high computational demands often require powerful cloud-based servers. This dependency on cloud computing raise… Continue reading New MIT protocol protects sensitive data during cloud-based computation

Cybersecurity is a fundamental component of patient care and safety

Healthcare institutions are custodians of vast repositories of sensitive patient data, encompassing comprehensive health histories, insurance profiles, and billing data. The ramifications of a data breach often extend far beyond the immediate task of p… Continue reading Cybersecurity is a fundamental component of patient care and safety

Human firewalls are essential to keeping SaaS environments safe

Businesses run on SaaS solutions: nearly every business function relies on multiple cloud-based tech platforms and collaborative work tools like Slack, Google Workspace apps, Jira, Zendesk and others. We recently surveyed security leaders and CISOs on … Continue reading Human firewalls are essential to keeping SaaS environments safe

SOCI Act 2024: Thales Report Reveals Critical Infrastructure Breaches in Australia

Thales’ 2024 Data Threat Report reveals key insights for Australian critical infrastructure under the SOCI Act 2024. Our exclusive interview with Erick Reyes reveals the security impacts. Continue reading SOCI Act 2024: Thales Report Reveals Critical Infrastructure Breaches in Australia

To improve your cybersecurity posture, focus on the data

Effectively converging, managing and using enterprise data is a huge undertaking. Enterprises have vast hoards of data, but those hoards exist within siloed systems and applications, and it requires a lot of manual effort by highly skilled data scienti… Continue reading To improve your cybersecurity posture, focus on the data

5 Types of IVR Testing Tools and When To Use Each

Discover the difference between types of IVR testing tools, ensuring optimal performance and security for your business phone system. Plus, we’ll show you when to DIY or call in the pros. Continue reading 5 Types of IVR Testing Tools and When To Use Each