data
How a Security Data Fabric Approach Can Transform the GRC Function
Creating a security data fabric protects an organization’s investment in its security and other IT controls by identifying performance issues so they can be fixed ...
Security Boulevard
Don’t Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection
Tom Eston | | AI, AI Boyfriend, AI Chat Bot, AI Companion, AI Girlfriend, Chat Bot, Cyber Security, Cybersecurity, data, Data Brokers, Data Collection, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, Podcast, Podcasts, Privacy, security, surveillance, technology, Trust, US government, Weekly Edition
In Episode 319, Tom and Kevin discuss the potential data privacy risks associated with having an AI ‘girlfriend’ or ‘boyfriend’ and why one should refrain from sharing their personal data with such ...
Securing Sensitive Information in Cloud Repositories
With the accelerating transition to cloud environments, securing sensitive information has emerged as a paramount concern ...
Security Boulevard
Checkmarx Report Surfaces Software Supply Chain Compromises
A Checkmarx report found 56% of attacks against software supply chains resulted in thefts of credential and confidential data ...
Security Boulevard
In 2023, Cybercriminals Were Still Using Social Engineering to Steal Your Credentials
Tyler Farrar | | AI, credentials, Cybersecurity, data, Data breaches, security, social engineering, social engineering techniques
Despite years of cybersecurity advancements, most threat actors use social engineering and stolen credentials and just log in ...
Security Boulevard
3 Best Practices to Improve Threat Hunting
Threat-hunting programs can proactively monitor malicious activity, find vulnerabilities and put organizations on the offensive ...
Security Boulevard
Maximizing Security in K-12 IT: Best Practices for Safeguarding Data
The prevalence of malicious cyber activity is increasing globally, and K–12 schools are not exempt ...
100 or So Cybersecurity Facts and Figures to Know
If you’re interested in getting a quick glimpse at the state of cybersecurity, this post ...
Survey Surfaces Wasted Efforts Collecting Cybersecurity Data
Security teams are wasting time and resources normalizing data to store and analyze it in a separate platform instead of relying on the same data IT teams use to manage operations ...
Security Boulevard
How to Make Your Threat-Hunting Program More Effective
As threats increase, here are three ways to improve the effectiveness and success of your organization's threat-hunting program ...
Security Boulevard