Feeds
|
All News
|
Login
Niharika Ray
Greenwashing by malware: The new cyber threat to sustainability data
Niharika Ray
e27
SBOM for OT: Can we actually do it?
Niharika Ray
e27
Right to explanation in systems that can’t fully explain themselves
Niharika Ray
e27
Data minimisation vs AI context maximisation: The battle defining the future of smart systems
Niharika Ray
e27
AI systems as policy executors without policy clarity
Niharika Ray
e27
Model resource exhaustion as a denial-of-intelligence attack
Niharika Ray
e27
Agent-to-agent trust: The next identity challenge
Niharika Ray
e27
AI-driven workflow automation and the loss of human friction
Niharika Ray
e27
Inference attacks in AI-integrated platforms
Niharika Ray
e27
Security implications of embedded finance in non-financial platforms
Niharika Ray
e27
Shadow automation: The new insider risk
Niharika Ray
e27
Security in headless architectures: When the frontend is no longer a control point
Niharika Ray
e27
Abuse engineering: The discipline security teams still don’t formalise
Niharika Ray
e27
Cyber risk is moving upstream but we’re still defending downstream
Niharika Ray
e27