data
Don’t Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection
In Episode 319, Tom and Kevin discuss the potential data privacy risks associated with having an AI ‘girlfriend’ or ‘boyfriend’ and why one should refrain from sharing their personal data with such ...
Securing Sensitive Information in Cloud Repositories
With the accelerating transition to cloud environments, securing sensitive information has emerged as a paramount concern ...
Checkmarx Report Surfaces Software Supply Chain Compromises
A Checkmarx report found 56% of attacks against software supply chains resulted in thefts of credential and confidential data ...
In 2023, Cybercriminals Were Still Using Social Engineering to Steal Your Credentials
Despite years of cybersecurity advancements, most threat actors use social engineering and stolen credentials and just log in ...
3 Best Practices to Improve Threat Hunting
Threat-hunting programs can proactively monitor malicious activity, find vulnerabilities and put organizations on the offensive ...
Maximizing Security in K-12 IT: Best Practices for Safeguarding Data
The prevalence of malicious cyber activity is increasing globally, and K–12 schools are not exempt ...
100 or So Cybersecurity Facts and Figures to Know
If you’re interested in getting a quick glimpse at the state of cybersecurity, this post ...
Survey Surfaces Wasted Efforts Collecting Cybersecurity Data
Security teams are wasting time and resources normalizing data to store and analyze it in a separate platform instead of relying on the same data IT teams use to manage operations ...
How to Make Your Threat-Hunting Program More Effective
As threats increase, here are three ways to improve the effectiveness and success of your organization's threat-hunting program ...
Don’t Ignore Data Sovereignty
What does data sovereignty mean for organizations and what’s the best practice for ensuring compliance? ...