Generative AI adoption: Strategic implications & security concerns
By Manuel Rodriguez. With more than 15 years of experience in cyber security, Manuel Rodriguez is currently the Security Engineering…
By Manuel Rodriguez. With more than 15 years of experience in cyber security, Manuel Rodriguez is currently the Security Engineering…
Within the last few weeks, the major AI competitors OpenAI, Google, and Microsoft unveiled several new products and capabilities of…
A GDPR one-stop shop Few people like spreadsheets. Fewer still like multiple spreadsheets. Similarly, few people enjoy complex compliance, with…
This newsletter summarizes cybersecurity news from June and July, and boy there are some big events that happened. From CrowdStrike's…
I have now had the privilege of attending RSA for over 20 years, yet this conference never grows old! My…
The StormCloud Chinese threat group used a compromised Internet Service Provider (ISP) to distribute malware that spoofed software updates. The…
EXECUTIVE SUMMARY: Earlier today, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), distributed a…
Discover the top 10 cyber attacks. Learn how to identify the attacks through scenarios and then take steps to mitigate…
You’ll often see the terms cyber security and information security used interchangeably. That’s because, in their most basic forms, they…
Today’s organizations rely on a more diverse array of devices than ever before. From laptops to desktops, smartphones to smart…