owasp-llm

OWASP Top 10 for LLM Applications and Mitigation

| | Cybersecurity
The increasing use of Large Language Models (LLMs) across various applications has revolutionized how we interact with technology, from virtual assistants to advanced data analysis tools. However, like any emerging technology, LLMs ...
This is not Morgan Freeman  -  A Deepfake Singularity

Recognizing Deepfakes is Essential Cybersecurity Training

For 2024, new cybersecurity training in recognizing deepfakes will be important for organizations In recent days, the importance of recognizing deepfakes has been international news, with major celebrities falling prey to explicit ...
The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices

The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices

In this episode of the Shared Security Podcast, we discuss the concerning issue of victim-blaming in cybersecurity with special guest, Andra Zaharia, host of the Cyber Empathy and We Think We Know ...
Microsoft Breach: What Happened? What Should Azure Admins Do?

Microsoft Breach — How Can I See This In BloodHound?

Microsoft Breach — How Can I See This In BloodHound?SummaryOn January 25, 2024, Microsoft announced Russia’s foreign intelligence service (i.e., Sluzhba vneshney razvedki Rossiyskoy Federatsii [SVR]) breached their corporate EntraID environment. We reviewed the ...
Microsoft Breach — What Happened? What Should Azure Admins Do?

Microsoft Breach — What Happened? What Should Azure Admins Do?

Microsoft Breach — What Happened? What Should Azure Admins Do?On January 25, 2024, Microsoft published a blog post that detailed their recent breach at the hands of “Midnight Blizzard”. In this blog post, I will ...
cloud security, cloud, cloud environment, data privacy, data protection, cloud security teams, security, cloud-native, Palo Alto Dell zero trust Network Security multi-cloud zero-trustQualys multi-cloud Wi-Fi 6 access point zero-trust cloud security remote data protection

Survey Surfaces Raft of Cloud Security Challenges

Most IT practitioners rely on legacy platforms and practices originally designed for on-premises IT to secure cloud computing environments ...
Security Boulevard
phishing Telegram

In 2023, Cybercriminals Were Still Using Social Engineering to Steal Your Credentials

Despite years of cybersecurity advancements, most threat actors use social engineering and stolen credentials and just log in ...
Security Boulevard

Cybersecurity and Governance: Safeguarding Citizen Data by Law

Navigating the legal landscape to ensure robust protection for citizen data We live in a time where data breaches are daily front-page news, and states and government departments are under increasing pressure ...
What the Latest Updates to Cybersecurity Regulations Mean For You

What the Latest Updates to Cybersecurity Regulations Mean For You

In 2023, there were a number of new cybersecurity regulations introduced in the U.S. and the EU designed to protect organizations’ digital assets. But it can be tricky to make sense of ...

Trends and Innovations in Enterprise Live Patching Services for Cybersecurity

Live patching plays a vital role in helping enterprises stay secure   Live patching is becoming crucial for maintaining compliance with various data privacy standards and regulations   TuxCare’s Extended Lifecycle Support ...