Today’s cybersecurity health checks must identify AI-based threat risks. Does yours?

Today’s cybersecurity health checks must identify AI based threats. Does yours?

Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace ...
CNN reporter calls his parents using an AI deepfake voice. Watch what happens next

Listen to These Recordings: Deepfake Social Engineering Scams Are Scaring Victims

Deepfake social engineering scams have become an increasingly scary trend among cybercriminals to socially engineer victims into submission. The threat actors are using Artificial Intelligence (AI) and Machine Learning (ML) voice cloning ...

HR’s Growing Role in Cybersecurity

Companies worried about cybersecurity should know that the real risk is inside their corporate firewall. Corporate leaders spend a lot of time worrying about nation-state actors and ransomware gangs, but in Gartner ...

When it comes to insider risk, the difference is human

We have a saying here at DTEX: the difference is human. We know that enterprise security is only achievable when the cyber strategy is underpinned by the human element – the only ...
open source security

4 Tips to Develop a Human-Layered Cybersecurity Defense

Evidence suggests that cybercriminals can infiltrate 93% of all networks, even though organizations plow billions of dollars on cybersecurity each year. This is because most organizational approaches to cybersecurity are still overly ...
Security Boulevard

How to Stimulate Organizations’ Security Awareness Training Programs

We all know how important security awareness training is for an organization. Moreover, we try to enhance our efforts by weaving security into the “culture” of the organization. Yet, from the employee’s perspective, ...

Secure Guardrails