Technology

Detecting & Handling Data Drift in Production

Machine learning models are trained on historical data and deployed in real-worl...

Quantization in Machine Learning: 5 Reasons Why It Matt...

Quantization might sound like a topic reserved for hardware engineers or AI rese...

Applications with Context Vectors

This post is divided into two parts; they are: • Contextual Keyword Extraction •...

Generating and Visualizing Context Vectors in Transformers

This post is divided into three parts; they are: • Understanding Context Vectors...

5 Lessons Learned Building RAG Systems

Retrieval augmented generation (RAG) is one of 2025's hot topics in the AI lands...

Hackers Exploit Copilot AI for SharePoint to Access Pas...

Multiple vulnerabilities in Microsoft’s Copilot AI for SharePoint, enabling atta...

New Technique that Let Attackers Obtain Microsoft Entra...

A new technique that enables attackers to obtain Microsoft Entra refresh tokens ...

UK Retailers Reeling From Likely Ransomware Attacks

A series of cyberattacks have struck multiple major British retailers in recent ...

What NY's New Security Rules Mean for Finance Firms

According to the New York Department of Financial Services, finance companies op...

Attackers Ramp Up Efforts Targeting Developer Secrets

Software teams need to follow security best practices to eliminate the leak of s...

Despite Arrests, Scattered Spider Continues High-Profil...

While law enforcement has identified and arrested several alleged members, the n...

Cut CISA and Everyone Pays for It

Gutting CISA won't just lose us a partner. It will lose us momentum. And in this...

SANS Top 5: Cyber Has Busted Out of the SOC

This year's top cyber challenges include cloud authorization sprawl, ICS cyberat...

Enterprises Need to Beware of These 5 Threats

A panelist of SANS Institute leaders detailed current threats and provided actio...

Experts Debate Real ID Security Ahead of May 7 Deadline

Real IDs have been in the works since 2005. Are their security standards still r...

Getting Outlook.com Ready for Bulk Email Compliance

Microsoft has set May 5 as the deadline for bulk email compliance. In this Tech ...

A Cybersecurity Paradox: Even Resilient Organizations A...

Organizations are underestimating the advanced technology's risks to the softwar...

When Threat Actors Behave Like Managed Service Providers

How one unreasonable client got lucky during a cyber incident, despite their unr...

Microsoft Readies Administrator Protection Option for W...

Microsoft's David Weston describes the new feature as the most significant archi...

Putin's Cyberattacks on Ukraine Rise 70%, With Little E...

Russia's cyberattacks on Ukraine have increased dramatically, targeting the coun...

Billbug Expands Cyber-Espionage Campaign in Southeast Asia

The China-linked cyber-operations group, better known as Lotus Panda, uses its o...

Cisco Boosts XDR Platform, Splunk With Agentic AI

Cisco joins the agentic AI wave with the introduction of advanced LLMs to autono...

Prolific RansomHub Operation Goes Dark

The chat infrastructure and data-leak site of the notorious ransomware-as-a-serv...

Former CISA Head Slams Trump Admin Over 'Loyalty Mandate'

Jen Easterly, former director of CISA, discussed the first 100 days of the secon...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.