Cybersecurity
OWASP Top 10 for LLM Applications and Mitigation
The increasing use of Large Language Models (LLMs) across various applications has revolutionized how we interact with technology, from virtual assistants to advanced data analysis tools. However, like any emerging technology, LLMs ...
Recognizing Deepfakes is Essential Cybersecurity Training
For 2024, new cybersecurity training in recognizing deepfakes will be important for organizations In recent days, the importance of recognizing deepfakes has been international news, with major celebrities falling prey to explicit ...
The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices
Tom Eston | | 23andMe, Andra Zaharia, Cyber Empathy Podcast, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, DNA, empathy, Episodes, Ethics, Information Security, Infosec, Pentest Tools, Podcast, Podcasts, Privacy, responsibility, security, technology, Victim Blaming, We Think We Know Podcast, Weekly Edition
In this episode of the Shared Security Podcast, we discuss the concerning issue of victim-blaming in cybersecurity with special guest, Andra Zaharia, host of the Cyber Empathy and We Think We Know ...
Microsoft Breach — How Can I See This In BloodHound?
Microsoft Breach — How Can I See This In BloodHound?SummaryOn January 25, 2024, Microsoft announced Russia’s foreign intelligence service (i.e., Sluzhba vneshney razvedki Rossiyskoy Federatsii [SVR]) breached their corporate EntraID environment. We reviewed the ...
Microsoft Breach — What Happened? What Should Azure Admins Do?
Microsoft Breach — What Happened? What Should Azure Admins Do?On January 25, 2024, Microsoft published a blog post that detailed their recent breach at the hands of “Midnight Blizzard”. In this blog post, I will ...
Survey Surfaces Raft of Cloud Security Challenges
Most IT practitioners rely on legacy platforms and practices originally designed for on-premises IT to secure cloud computing environments ...
Security Boulevard
In 2023, Cybercriminals Were Still Using Social Engineering to Steal Your Credentials
Tyler Farrar | | AI, credentials, Cybersecurity, data, Data breaches, security, social engineering, social engineering techniques
Despite years of cybersecurity advancements, most threat actors use social engineering and stolen credentials and just log in ...
Security Boulevard
Cybersecurity and Governance: Safeguarding Citizen Data by Law
Nik Hewitt | | advice, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research
Navigating the legal landscape to ensure robust protection for citizen data We live in a time where data breaches are daily front-page news, and states and government departments are under increasing pressure ...
What the Latest Updates to Cybersecurity Regulations Mean For You
In 2023, there were a number of new cybersecurity regulations introduced in the U.S. and the EU designed to protect organizations’ digital assets. But it can be tricky to make sense of ...
Trends and Innovations in Enterprise Live Patching Services for Cybersecurity
Rohan Timalsina | | Cyber Threats, Cybersecurity, Enterprise Live Patching Services, Kernel Care, live patching, Live Patching Education
Live patching plays a vital role in helping enterprises stay secure Live patching is becoming crucial for maintaining compliance with various data privacy standards and regulations TuxCare’s Extended Lifecycle Support ...