attackers, defenders, AI, AI-generated, adversarial attacks, ML

AI’s Role in Cybersecurity for Attackers and Defenders in 2024

As AI becomes available and robust, malicious actors have already used it to develop more advanced attack methods; defenders must also leverage AI in 2024 ...
Security Boulevard
What is SOAR (Security Orchestration, Automation and Response)? Explained by a SecOps Professional

XDR vs. SIEM vs. SOAR: A Vendor-Agnostic Perspective

For modern SOC teams, detection and response is a big data problem. Effective cyber defense hinges on collecting, analyzing, and acting on massive troves of security-relevant data. This is where tools like ...
cybersecurity

The More Cybersecurity Changes, the More It Stays the Same

It is time for an evolution in cybersecurity that focuses on adversary disruption Despite major advancements in technology, the global approach to cybersecurity has remained the same for decades: Respond and recover ...
Security Boulevard

Cloud Adoption Cited as Top Initiative in Workforce Transformation

Digital transformation is changing the global workforce, from how we work to where we work from. Organizations are investing in new digital technology to address the impacts of globalization, demographics, work styles ...

New Data Privacy Regulation Deadline Spawns Phishing Attack Outbreak

The use of trendy stories or pressing compliance deadlines to launch attacks is nothing new to cyber criminals. While phishing attacks cause pain for consumers, the implications on the corporate side are ...
Don’t be an asymptote! Understanding the cost of delayed threat response

Don’t be an asymptote! Understanding the cost of delayed threat response

Figure 1 - Example of asymptote of a function approaching infinity It should be the unwritten rule of cybersecurity: Don’t make an asymptote of yourself or your team members. As you may ...
Don’t be an asymptote! Understanding the cost of delayed threat response

Don’t be an asymptote! Understanding the cost of delayed threat response

Figure 1 - Example of asymptote of a function approaching infinity It should be the unwritten rule of cybersecurity: Don’t make an asymptote of yourself or your team members. As you may ...