Announcing AI/ML safety and security trainings

By Michael D. Brown We are offering AI/ML safety and security training in summer and fall of this year! Recent advances in AI/ML technologies opened up a new world of possibilities for ...
cybersecurity worker skills gap

Narrowing the Stubborn Cybersecurity Worker Gap

There is still a significant gap between cybersecurity needs and available talent, according to Cyberseek, but all those tech industry layoffs are raising eyebrows. Organizations can expand the candidate pool by training ...
Security Boulevard
phishing, simulation, AI cybersecurity

Cybersecurity Training Reduces Phishing Threats – With Numbers to Prove It

Train people. It makes a difference. In organizations without security awareness training, 34% of employees are likely to click on malicious links or comply with fraudulent requests ...
Security Boulevard
PCAP - Network Forensics Training - October 21-24, November 18-21

Online Network Forensics Class

I will teach two live online classes this autumn, one in October and one in November. The subject for both classes is network forensics for incident response. The training is split into ...
GenAI, artificial intelligence, risks, threats, ChatGPT Gemini generative AI

Risks of GenAI Rising as Employees Remain Divided About its Use in the Workplace

One in three office workers who use GenAI admit to sharing customer info, employee details and financial data with the platforms. Are you worried yet? ...
Security Boulevard
Unlock Your Cybersecurity Career: Exclusive Discounts on Top Training Courses!

Unlock Your Cybersecurity Career: Exclusive Discounts on Top Training Courses!

 There are tremendous opportunities in cybersecurity and the industry needs many more qualified workers.  Training plays an important part.  That is why I am partnering with Infosec4TC, an online training provider that offers ...

Understanding Python pickling and how to use it securely

Explore Python pickling - an essential method for object serialization. Learn how to securely convert an object structure into a byte stream with Python.The post Understanding Python pickling and how to use ...
4 approaches to vulnerability remediation

4 approaches to vulnerability remediation

Explore the 4 options for vulnerability remediation in software security. Gain insights into prioritizing issues and implementing effective strategies.The post 4 approaches to vulnerability remediation appeared first on Software Security ...

Six Python security best practices for developers

Explore six essential Python security practices every developer should use to safeguard applications from potential attacks. Keep your code secure!The post Six Python security best practices for developers appeared first on Software ...