Phishing Scams Using Chatbots to Capture Personal Information
Among the myriad creative phishing tactics employed by scammers, one of the latest (and most…
ChatGPT From A Pen Tester’s Point Of View
ChatGPT has significant potential to transform the landscape of penetration testing by…
The Future Of Endpoint Monitoring: SIEM, EDR, XDR, and Data Collectors
The endpoint monitoring space has evolved through a number of stages to arrive where it…
The Future of Identity
Identity and Access Management veteran Jim Gerken of Novacoast provides some insight on the…
AI Danger: Aligning Cyber and Policy Experts
For cybersecurity experts and policymakers, the GPT-4 System Card is one of the most…
FTC Safeguards Rule Changes 2023 | What You Need to Know
The FTC has announced changes to its Safeguards Rule that go into effect this June to…
The Latest Trends in Data Security
Michael Howden of Novacoast gives his annual update on the current state of methodologies…
Breaking the Vulnerability & Patch Divide
Scott Savenelli explains why his approach to vulnerability and patch management has…
Pain in the Supply Chain
The supply chain continues to be a successful vector in high-profile cyber attacks. This…
AI Use Cases For The Modern Cybersecurity Professional
Incorporating AI as a tool available to security professionals can lower barriers to complex…
Roundup—The Rundown On 7 Recent High-Profile Data Breaches
A roundup of 7 recent data breaches affecting high-profile organizations with explanations…
A Threat Hunter’s Breakdown Of Magniber Ransomware
Magniber ransomware's evolution of clever TTPs along with its relative obscurity and brutal…