Organizations today face a surge of vulnerabilities and exposures. With data on assets and exposures scattered across platforms, complexity hinders timely action. Security teams are left to manually ...
API attacks can be costly. Really costly. Obvious financial impacts like legal fines, stolen finances, and incident response budgets can run into the hundreds of millions. However, other hidden costs ...
In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election ...
Deployment of 5G and AI-enhanced IoT systems is accelerating. This, in turn, is driving up the number of IoT-connected ...
Your internet account passwords are probably among the most guarded pieces of information you retain in your brain. With ...
The Tennessee Information Protection Act (TIPA), effective July 1, 2025, is a state-level data privacy law that regulates how companies manage and protect consumers’ personal data within Tennessee. ...
ISPs face a few unique challenges and risks when it comes to DDoS attacks. Their size and complexity make them bigger targets for hackers, while their unique structural features require more tailored ...
Faced with a critical system failure, would you choose a month without MFA or data backups? Explore the consequences of each in this risk management exercise.
Have you ever wondered how to get the most from generative AI models built into your cybersecurity tools? While there is a ...
CISA is warning about a spear-phishing campaign that spreads malicious RDP files. Plus, OWASP is offering guidance about ...
Oh, the holidays! A time for cheer, a time for joy, a time for ... a whole lot of shopping. As gift lists grow, shoppers are ...
The Open Source Initiative has published (news article here) its definition of “open source AI,” and it’s terrible. It allows for secret training data and mechanisms. It allows for development to be ...