Privacy and AI Relationships: The Dangers of Trusting Your AI Girlfriend/Boyfriend

Don’t Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection

In Episode 319, Tom and Kevin discuss the potential data privacy risks associated with having an AI ‘girlfriend’ or ‘boyfriend’ and why one should refrain from sharing their personal data with such ...
cloud security teams, security, cloud-native, Palo Alto Dell zero trust Network Security multi-cloud zero-trustQualys multi-cloud Wi-Fi 6 access point zero-trust cloud security remote data protection

Securing Sensitive Information in Cloud Repositories

With the accelerating transition to cloud environments, securing sensitive information has emerged as a paramount concern ...
Security Boulevard
IONIX software supply chain, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity

Checkmarx Report Surfaces Software Supply Chain Compromises

A Checkmarx report found 56% of attacks against software supply chains resulted in thefts of credential and confidential data ...
Security Boulevard
phishing Telegram

In 2023, Cybercriminals Were Still Using Social Engineering to Steal Your Credentials

Despite years of cybersecurity advancements, most threat actors use social engineering and stolen credentials and just log in ...
Security Boulevard
threat-hunting program. threat hunting, teams, intelligence, Edge Devices data threats IT cybersecurity defense attack alerts machine identity management insider threats security phishing Cybersecurity Threats on the Rise

3 Best Practices to Improve Threat Hunting

Threat-hunting programs can proactively monitor malicious activity, find vulnerabilities and put organizations on the offensive ...
Security Boulevard

Maximizing Security in K-12 IT: Best Practices for Safeguarding Data

The prevalence of malicious cyber activity is increasing globally, and K–12 schools are not exempt ...

100 or So Cybersecurity Facts and Figures to Know

If you’re interested in getting a quick glimpse at the state of cybersecurity, this post ...
Veeam data Rezilion Spring4Shell Log4j vulnerabilities time Kaseya ransomware recovery REvil

Survey Surfaces Wasted Efforts Collecting Cybersecurity Data

Security teams are wasting time and resources normalizing data to store and analyze it in a separate platform instead of relying on the same data IT teams use to manage operations ...
Security Boulevard
Google bug bounty AI

How to Make Your Threat-Hunting Program More Effective

As threats increase, here are three ways to improve the effectiveness and success of your organization's threat-hunting program ...
Security Boulevard

Don’t Ignore Data Sovereignty

What does data sovereignty mean for organizations and what’s the best practice for ensuring compliance? ...
Security Boulevard