The Turing Test measures machine intelligence by assessing whether an AI can engage in conversations indistinguishable from those of a human. Conceptualized by Alan Turing in 1950, the Turing Test originally qualified a computer’s capacity for human-like intelligence by its…
Tag: IT SECURITY GURU
What Is the Turning Test? Hassan Taher Decodes the Turing Test’s Relevance in Modern AI
The Turing Test measures machine intelligence by assessing whether an AI can engage in conversations indistinguishable from those of a human. Conceptualized by Alan Turing in 1950, the Turing Test originally qualified a computer’s capacity for human-like intelligence by its…
Digital Legacy AI CEO Glenn Devitt Bridges Military Intelligence and Cybersecurity
Former Army Special Operations Intelligence specialist combines battlefield experience with cutting-edge cybersecurity expertise to revolutionize digital inheritance while addressing critical infrastructure vulnerabilities. The cybersecurity landscape demands leaders who understand both technical complexity and operational reality under pressure. Glenn Devitt represents…
Keeper Security Announces Integration With CrowdStrike Falcon Next-Gen SIEM
Keeper Security has announced a new partnership with CrowdStrike, which aims to protect businesses against cyber threats. Keeper’s cloud-native PAM platform, KeeperPAM®, now integrates with CrowdStrike Falcon® Next-Gen SIEM, the AI-powered engine of the modern Security Operations Center (SOC). Organisations can…
Check Point Unveils Enterprise Browser to Secure BYOD and Third-Party Devices
Check Point Software has expanded its Harmony SASE offering with the launch of Enterprise Browser, a tool designed to close one of the biggest gaps in enterprise security: unmanaged devices. The new feature extends Zero Trust protections to personal laptops,…
Discover the Power of Usenet for Global Access and Privacy
What is Usenet? Have you ever heard of Usenet? It might sound like a relic from the past, but nothing could be further from the truth. Usenet is a globally distributed network that has been around since the ’80s and…
Bringing the Human Back into Cybersecurity: What Values-Based Education Teaches Us About Digital Mindfulness
Recently, I had the pleasure of speaking with Inda Sahota, the dynamic and deeply empathetic force behind cybersecurity awareness at Fresenius Group. What struck me most wasn’t just her deep understanding of human-centric security, it was how naturally she bridges…
AI-Powered Cyber Crime Raises Worldwide Alarm Bells.
AI-Powered Cyber Crime Raises Worldwide Alarm Bells. A new report from Anthropic, an AI startup backed by Amazon and Google, revealed a major shift in the cybercrime landscape. Through the use of Anthropic’s own AI model (Claude) and coding agent…
Check Point Named Leader in Gartner 2025 Magic Quadrant for Hybrid Mesh Firewalls
Check Point Software has been recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewalls, with the research firm citing the company’s execution and completeness of vision. The recognition highlights Check Point’s approach to hybrid mesh…
KnowBe4 Report Reveals Global Financial Sector Faces Unprecedented Cyber Threat Surge
KnowBe4, the human risk management cybersecurity platform, has released its latest research paper “Financial Sector Threats Report,” uncovering critical insights into the escalating cybersecurity crisis facing the global financial sector. The report shows that financial institutions face a perfect storm…
Keeper Security Launches KeeperAI
Keeper Security has today unveiled KeeperAI, a new agentic AI feature for its KeeperPAM® platform. KeeperAI enables real-time session monitoring and analysis, automated threat classification and instant response to combat cyber attacks and suspicious behaviour – customisable to meet an organisation’s…
Ziplining into the Minds of US Supply Chains
A recent report from Check Point Research uncovered Zipline, a phishing campaign that fuses subtle, patient social engineering with stealthy in-memory malware, together enabling attackers to slip past traditional defences and manipulate human behaviour on a wide scale. How…
Keeper Security Launches Biometric Login with Passkeys
Keeper Security has announced the release of biometric login using FIDO2/WebAuthn passkeys on the Chrome/Edge browser extension and Keeper Commander CLI. This update, the first of its kind in the industry, enables users to securely access their Keeper Vault with passkeys…
Salt Security Named an Overall Leader in KuppingerCole 2025 Leadership Compass for API Security and Management
Salt Security has been named an Overall Leader in the KuppingerCole Leadership Compass for API Security and Management 2025. The company was also recognised as a Leader in the Product, Innovation, and Market categories, underscoring the strength of its comprehensive,…
PPN 01/24: What It Means and How Businesses Can Prepare
In January 2024, the UK Cabinet Office issued a new Procurement Policy Note (PPN 01/24) aimed at strengthening cybersecurity across the public sector supply chain. The policy, which came into effect on 1 April 2024, sets out new requirements for…
KnowBe4 Finds Top Cybersecurity Risk is Employee Distraction, Not Threat Sophistication
KnowBe4, the security training provider, today released a new report entitled Navigating Cyber Threats: Infosecurity Europe 2025 Findings. The findings show that cybersecurity professionals are sounding the alarm; not about increasingly sophisticated cyber threats, but about something far more human…
Black Duck Debuts GitHub App to Automate Security Scans at Scale
Black Duck has released a new GitHub App designed to make it easier for development and security teams to automate security testing across their repositories. Now available in the GitHub Marketplace, the Black Duck Security GitHub App integrates with Polaris,…
Workday Discloses Data Breach Following CRM-Targeted Social Engineering Attack
Workday, a leading provider of human resources and financial management software, has confirmed that it fell victim to a data breach stemming from a social engineering attack targeting a third-party Customer Relationship Management (CRM) system. According to the company, the…
How Online Poker Platforms Are Reinventing Cybersecurity Standards for Digital Gaming
The threat of cybercrime is continuously growing online. Developing technology can certainly be a great tool for societal improvement. However, it has its ramifications. The most obvious is that new technologies mean that bad actors have the ability to more…
Lack of Developer Training Fuels Cyber Breaches Across UK Organisations
A new survey from SecureFlag has revealed serious shortcomings in how UK businesses protect themselves from software-related threats. In a poll of 100 C-suite and technology leaders, 67% admitted their organisation had suffered at least one cybersecurity breach or major…