Advertisement

cloud security

The great wall of China at sunset. (Getty Images)

AI security’s ‘Great Wall’ problem

AI security requires more than cloud hardening. The real attack surface isn't your infrastructure—it's the supply chains, agents, and humans that make up the system around it.
“Move fast and break things” Facebook CEO Mark Zuckerberg onstage at the F8 conference 2014. (Mike Deerkoski via Wikimedia Commons, CC BY 2.0, https://creativecommons.org/licenses/by/2.0/)

We moved fast and broke things. It’s time for a change.

For 20 years, tech has moved fast and broken things. The result: a cybersecurity crisis built on rushed code and vulnerable software. It's time to replace speed-at-all-costs…
Advertisement
Shakhtar Donetsk’s Ukrainian midfielder #10 Georgiy Sudakov (C) vies for the ball during the UEFA Champions League football match FC Shakhtar Donetsk vs BSC Young Boys in Gelsenkirchen, western Germany, on November 6, 2024. Hackers were recently found to be exploiting Jupyter notebooks to host illegal streams of this particular Champions League game. (Photo by INA FASSBENDER/AFP via Getty Images)

Attackers are hijacking Jupyter notebooks to host illegal Champions League streams

Normally reserved for data analysis, a cybersecurity firm caught online content pirates hosting soccer matches.
Advertisement
Advertisement
Advertisement