Drones and the US Air Force

Fascinating analysis of the use of drones on a modern battlefield—that is, Ukraine—and the inability of the US Air Force to react to this change. The F-35A certainly remains an important platform ...

Securing the Internet of Things: Penetration testing’s role in IoT device security

| | Uncategorized
The world is witnessing a remarkable transformation as more devices become interconnected, forming what’s known as the Internet of Things (IoT). From smart refrigerators and thermostats to wearable fitness trackers... The post ...
Unveiling The Applications and Distinctions of Machine Learning and Artificial Intelligence in Cybersecurity

Unveiling The Applications and Distinctions of Machine Learning and Artificial Intelligence in Cybersecurity

The terms "machine learning" and "artificial intelligence" are frequently used in cybersecurity, often interchangeably, leading to confusion about their precise meanings and applications. Both machine learning and artificial intelligence play pivotal roles ...

Why Application Segmentation is a Business Essential

Why is application segmentation so important for solid cybersecurity protection? Application segmentation plays a crucial role in organizational cybersecurity for several compelling reasons. Individually segmenting our numerous applications involves dividing a network’s ...

A Taxonomy of Prompt Injection Attacks

Researchers ran a global prompt hacking competition, and have documented the results in a paper that both gives a lot of good examples and tries to organize a taxonomy of effective prompt ...
Why Edtech Industries Need Cybersecurity?

Why Edtech Industries Need Cybersecurity?

As educational technology (edtech) industries gets better, it changes the way how students learn. But now, keeping student information safe is a big worry. People like parents and teachers are really concerned, ...

How Public AI Can Strengthen Democracy

With the world’s focus turning to misinformation,  manipulation, and outright propaganda ahead of the 2024 U.S. presidential election, we know that democracy has an AI problem. But we’re learning that AI has ...
Generative AI Governance: Balancing Innovation and Ethical Responsibility

Generative AI Governance: Balancing Innovation and Ethical Responsibility

As artificial intelligence (AI) continues its march toward realization, the realm of “possible” expands with each passing day. Breakthroughs in machine learning, advanced computing, and cognitive reasoning are revolutionizing industries and reshaping ...

Surveillance through Push Notifications

The Washington Post is reporting on the FBI’s increasing use of push notification data—”push tokens”—to identify people. The police can request this data from companies like Apple and Google without a warrant ...
Backup Blog Bites #3: The Backup Immutability Do’s & Don’ts Checklist 

Backup Blog Bites #3: The Backup Immutability Do’s & Don’ts Checklist 

| | Uncategorized
Since backups are becoming lucrative targets for cybercriminals, vendors like Cohesity, Commvault, Dell, Rubrik, Veeam and Veritas have responded with new ransomware protection features – including immutability.  The post Backup Blog Bites #3: ...