Horizon3.ai insider threat cybersecurity alert fatigue

Cybersecurity in 2022: It’s Not Getting Easier

As we wrap up the year, it always makes sense to take a look back and see what worked and what didn’t; what we can do better and what we have to ...
Security Boulevard
Robert M. Lee's & Jeff Haas' Little Bobby Comic - 'WEEK 422’

Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 422’

via the respected security expertise of Robert M. Lee and the superlative illustration talents of Jeff Haas at Little Bobby Comic Permalink ...
A Former FBI Agent’s Thoughts: National Cybersecurity Strategy

A Former FBI Agent’s Thoughts: National Cybersecurity Strategy

|
The government just released its new National Cybersecurity Strategy built around five pillars: Pillar One: Defend Critical Infrastructure Pillar Two: Disrupt and Dismantle Threat Actors Pillar Three: Shape Market Forces to Drive ...
How to Ensure Your Development Complies With SOC 2

How to Ensure Your Development Complies With SOC 2

| | Cybersecurity, SOC 2
Discover what you need to know from a development point of view for SOC 2 compliance. The post How to Ensure Your Development Complies With SOC 2 appeared first on Scytale ...
The AI Risk Landscape: How ChatGPT Is Shaping the Way Threat Actors Work

The AI Risk Landscape: How ChatGPT Is Shaping the Way Threat Actors Work

Flashpoint assesses that ChatGPT will lower the barrier to entry for basic hacking tasks, such as scanning open ports, crafting phishing emails, and deploying virtual machines for low-sophisticated threat actors. The post ...
USENIX Security '22

USENIX Security ’22 – ‘Security At The End Of The Tunnel: The Anatomy Of VPN Mental Models Among Experts And Non-Experts In A Corporate Context’

|
Complete Title: 'USENIX Security '22 - Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets - ‘Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts ...
Industry 4.0 vs. Smart Factory: What Will the Future Look Like?

Industry 4.0 vs. Smart Factory: What Will the Future Look Like?

It isn’t easy to imagine the process that brings all our things into being. Just think about the journey your computer made from parts in a The post Industry 4.0 vs. Smart ...
How Hackers are Exploiting Cloud Organizations | Eureka Security

How Hackers are Exploiting Cloud Organizations | Eureka Security

|
Protect your organization from data breaches in the cloud. Learn how hackers are accessing sensitive data and growing in their sophistication. | Eureka Security ...
security collaboration Cohesity The Time for Collaborative Security Is Now

Six Ways to Foster a Security Mindset in Engineering Teams

Human error can be found at the root of the vast majority of cybersecurity breaches. According to Verizon’s 2022 Data Breach Investigations Report, 82% of global cybersecurity incidents included some level of ...
Security Boulevard