Information security
fromTheregister
11 hours agoCommvault has a Ctrl+Z for rogue AI agents
Commvault's AI Protect monitors AI agents in cloud environments and can roll back actions to enhance AI resilience.
"World Cloud Security Day is a useful reminder to recognize how much cloud risk now comes down to everyday access decisions and overlooked misconfigurations," says James Maude, Field CTO at BeyondTrust.
"In a prior life, I was briefly and mildly Internet famous for my activism and advocacy work. The subsequent intrusions on my life and physical safety became a shocking revelation in how exposed I was, and I found myself scrambling to lock everything down."
Connected vehicles are becoming software-defined, sensor-rich, and permanently online. This evolution expands both legal exposure across sectors and legal frameworks that were traditionally unfamiliar for the automotive and transportation industry: (i) telecoms licensing and cross-border connectivity, (ii) data protection and data-sharing (e.g. with insurers/ad-tech), (iii) cybersecurity and safe Over-The-Air (OTA) governance, (iv) product liability for automated/Advanced Driver Assistance Systems (ADAS) features, (v) eCall obligations amid 2G/3G mobile network sunsets, (vi) national-security supply-chain controls, and (vii) IP disputes.
What if I told you that everything you know and everything you do to ensure quality backups is no longer viable? In fact, what if I told you that in an era of generative AI, when it comes to backups, we're all pretty much screwed?
QR codes are two-dimensional images with glyphs of various sizes that store not just numbers, but text. When scanned, your phone extracts the encoded information and can act on it. For example, QR codes often embed URLs, allowing you to scan, say, a parking meter to launch a webpage where you can pay online.
Session replay tools capture different types of user actions. Some tools focus on DOM-level signals like clicks, scrolls, and heatmaps. Others provide full video-style replays of user sessions. Because capabilities vary so widely, you need to understand exactly what data a tool collects and the privacy risk that comes with it.
In 1973, long before the modern digital era, the US Department of Health, Education, and Welfare (HEW) published a report called "Records, Computers, and the Rights of Citizens." Networked computers seemed "destined to become the principal medium for making, storing, and using records about people," the report's foreword began. These systems could be a "powerful management tool." But with few legal safeguards, they could erode the basic human right to privacy - particularly "control by an individual over the uses made of information about him."
In video comments, the U.S. Attorney General Pam Bondi said, "Make no mistake, under President Trump's leadership and this administration, you have the right to worship freely and safely. And if I haven't been clear already, if you violate that sacred right, we are coming after you." So people have a First Amendment right to worship that DOJ will protect, but journalists suddenly have no First Amendment right to report on issues of public interest and concern? We disagree.
Parents and guardians in the UAE are now legally required to supervise their children's online activity under the country's new Child Digital Safety Law, which transforms digital safety from guidance into enforceable responsibility. The legislation applies not only to families but also to global platforms used by children in the UAE, even if those companies have no physical presence in the country.