While this week was a little light on vulnerability news, itâs still been significant, with Microsoftâs Patch Tuesday happening as well as updates for major products, like Zoom. CYBERSECURITY INSIDER Feb 20, 2024 | Todayâs news and insights Note From the Writer's Desk: Google has rolled out the [AI Cyber Defense Initiative](, which is made up of funding, education and resources for cybersecurity professionals interested in using AI to get ahead of threats. The AI Cyber Defense Initiative consists of: - The AI for Cybersecurity cohort, which consists of 17 startups that will receive "internationalization strategies, AI tools, and the skills to use them" training from Google.
- The Google.org Cybersecurity Seminars Program will be expanded to all of Europe from its base of operations in Málaga, Spain.
- Magika, a Google-developed, AI-enhanced file type identification tool used to protect some Google projects, was made open source on Feb. 15.
- $2 million in research grants and strategic partnerships to go toward cybersecurity research initiatives at academic institutions. The idea behind the AI Cyber Defense Initiative is that Google supports efforts in which AI could potentially reverse the "Defenderâs Dilemma.â According to the Dilemma, an attacker only has to successfully breach a system once, while defenders need to protect proactively against all possible threats. TechRepublic stories about Google and security: - [Google Threat Analysis Groupâs Spyware Research: How CSVs Target Devices and Applications](
- [IBM, ISC2 Offer Cybersecurity Certificate]( [Jessica Dennis, Editor, TechnologyAdvice] Megan Crouse
Senior Staff Writer
[LinkedIn]( [Weekly Vulnerability Recap: News from Microsoft, Zoom, SolarWinds]( While this week was a little light on vulnerability news, itâs still been significant, with Microsoftâs Patch Tuesday happening as well as updates for major products, like Zoom. [Volt Typhoon Disrupts US Organizations, CISA Issues Alerts]( Volt Typhoon, a notorious cyber group linked to the Peopleâs Republic of China, has expanded its operations beyond illegal access and data theft. [What Is Packet Filtering? Definition, Advantages & How It Works]( Packet filtering is a firewall feature that allows or drops data packets based on simple, pre-defined rules. Discover the pros and cons, along with the four packet filtering types to be aware of, which determine its best use cases. TechRepublic Premium [Malware Response Checklist]( Whether a malware infection is the result of a disgruntled employee, hardware vulnerability, software-based threat, social engineering penetration, robotic attack or human error, all organizations must be prepared to immediately respond effectively. [Read More]( [Read more news]( Top Tech Resources [This Complete Ethical Hacking Bundle is Less Than $40]( Get a comprehensive, potentially lucrative ethical hacking education with 18 courses on today's top tools and tech. This bundle is just $39.97 now. Sponsored Content [Top Security Software Solutions]( This security software guide will help new and veteran buyers navigate the purchasing process by identifying the best security software vendors through an analysis of common trends, feature sets, and case studies. [Read More]( [What Is a Passkey? Definition, How It Works and More]( A passkey is a security measure used to grant access to a protected system. This guide explains how it works, and provides more information on its uses and benefits. [Read more news]( What We're Reading [How to Use LogMeOnce Step-by-Step Guide]( LogMeOnce has useful features that may be hard to navigate for some. Learn how to get the most out of LogMeOnce in this step-by-step guide. [Top Mobile Device Management (MDM) Software & Tools]( If your organization is looking for new tools to support your mobile device onboarding, offboarding, security, and other management needs, consider investing in one of the top mobile device management (MDM) software solutions reviewed in this article. [Demystifying Cloud Trends: Statistics and Strategies for Robust Security]( Take a deep dive into the crucial adoption statistics and effective strategies necessary for maintaining a resilient and secure cloud infrastructure. More Tech News [Executive Briefing]( [Cloud Insider]( [Innovation Insider]( [Cybersecurity Insider]( [Microsoft Weekly]( [TechRepublic Premium]( More Than A Newsletter Written by Mary Weilage Was this email forwarded to you? [Sign up here](. Related Publications [Project Management Insider]( Connect With Us [X]( | [LinkedIn]( | [Facebook]( About Cybersecurity Insider: Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices with this bi-weekly newsletter. [Sign up today]( Visit the [Subscription Center]( to get other free newsletters, manage your account settings or to be removed from TechRepublic communications. [Unsubscribe]( | [FAQ]( | [Terms of Use]( | [Privacy Policy]( © 2024 TechnologyAdvice, LLC. All rights reserved.
This is a marketing email from TechnologyAdvice, 3343 Perimeter Hill Dr., Suite 100, Nashville, TN 37211, USA. Please do not reply to this message. To contact us, please click [here.](