What is a Vulnerability ?
In the context of cybersecurity, a vulnerability is a weakness or flaw in a system’s security posture that could potentially be exploited by attackers to gain unauthorized access, steal data, or cause damage. How to rate them, & prioritize remediation ?
In the era of quantum computing, AI emerges as a powerful ally in fortifying cryptography. This article explores AI's crucial role in safeguarding data security, including post-quantum cryptography, quantum key distribution, error correction, protocol optimization, and network planning.
Capita faces first legal letter over alleged data breach.
Capita, a UK-based IT services company, has been served with its first legal letter over an alleged data breach that could have affected up to 9.5 million people.
Explore the essentials of securing Large Language Models (LLMs) in our comprehensive guide. Uncover the challenges of AI cybersecurity, learn to identify vulnerabilities, prevent adversarial attacks, and implement robust data protection. Stay ahead of the curve in maintaining model confidentiality .
A security breach at file transfer tool MoveIt has exposed the data of thousands of users, including the UK telecom watchdog Ofcom and the Minnesota Department of Education.
Explore the concept of leveraging Generative Pretrained Transformers (GPT) for authentication in cybersecurity. GPT models are typically used for natural language understanding and generation, but this article proposes using them as a means of behavioral biometric authentication.
There is an increased attack on Pharmaceutical and healthcare providers that has massive implications on new drug discovery, clinical trials , manufacturing and directly impacts human lives. I had written an article on my blog specific to ransomware attacks on the Indian Pharma and healthcare sector
Industrial Control System Cybersecurity is one of the most unsung, unpraised, unnoticed and yet one of the most valuable domain in society. This article will unveil the significance of Industrial Control System in cybersecurity.
The UK Information Commissioner has decided to issue
Tuckers Solicitors LLP with a Penalty Notice under the Data Protection Act
2018 and EU GDPR 2018. This penalty notice imposes an administrative fine on
Tuckers, to the amount of £98,000. Learn more about why this case is important!
Importance of appropriate Senior Management support for Cybersecurity and what is required to elicit the desired support.
Article initially published by ISACA at below ink:
https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2021/how-the-ciso-can-build-support-from-senior-management
Many folks reading about this topic struggle with the use of technical terms they don't fully understand. This article seeks to address that problem by providing some basic tips on Cyber Security in plain English. Enjoy and stay safe.
This article was initially published by ISACA by the same author. The link for original publication is given below.
https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2020/applied-collection-framework
Fadi Sodah AKA "madunix" is an IT veteran with over twenty-six years of experience. He is a 2019 MVE and an IT Director in the Amman Stock Exchange. He has years of experience aligning IT Strategy with overall business strategy, two things which he says aren't distinguishable anymore.
This article discusses some of the fundamental issues that need to be identified and resolved before any Cyber Security Team embarks on the journey to Threat Hunting.
Audience: Security Leadership & SOC Managers- Article does not delve into Threat Hunting technical and operational aspects
It is impossible to stop security attacks on data centers. But, we can protect crucial information by opting for resilient data center security solutions. This guide is all about the different types of data center security measures a company can use to secure people's data.
Taking steps to protect your company’s data, hardware, and IT investment is a key part of your duty as an IT professional. When it comes to security, it’s critical to think of the potential to shape your organization through opportunities rather than see security measures as hurdles to productivity.
We are going to list down some of the key factors that need to be considered at the time of mapping a multi-cloud strategy. Business clients should read this post to achieve a successful result after the adoption of a multi-cloud platform.
In the world of digitization, information is a valuable asset for businesses in every field. Today in this informative post, we are going to assist readers with security measures that most of the companies require. Read this post to determine the strategy that best suits your firm!
There are several data loss prevention software in the marketplace and picking up one is really difficult. Today this particular post is going to describe the exact definition of an intelligent data loss prevention and its use in the business world.