Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ethical Crossroads in AI: Unveiling Global Perspectives| Navigating the Dark Side of Technology

Dive into the intricate web of ethical dilemmas in AI development with me in this thought-provoking video. As we tread through the current phase of AI evolution, I explore the intrinsic differences in moralities and ethics between the East, West, South, and North. Delving into the darker side of humanity, we confront the potential misuse of advanced technology. Join the conversation as we revisit the debate on the consequences of good AI falling into the wrong hands. The looming question of a clash between ethical AI and malicious use is on the horizon, and it could escalate swiftly.

NIS2: Who is affected?

This is a question we get a lot from our customers. The NIS2 Directive’s wording is not always very explicit. NIS2 is a framework that countries need to implement. Because it’s a Directive and not a Regulation, each EU country has the autonomy to roll it out under their own interpretation. NIS2’s language is broad, making it challenging to get your head around, especially until countries publish their specifics.

Navigating the Cloud Misconfiguration Maze: A Cybersecurity Odyssey

Imagine a world where digital fortresses are impervious to cyber threats – a utopia for any cybersecurity professional. Yet, we live in a realm where one misstep in cloud configurations opens the gates to potential havoc. As someone who has journeyed through the labyrinth of cybersecurity for over two decades, I've witnessed firsthand how a simple misconfiguration can escalate from a minor hiccup to a full-blown security nightmare.

Top VR Games Of 2023

VR games have been steadily gaining popularity for several years now, and this immersive form of gaming could potentially revolutionize the industry. Is there a new VR game coming in 2024? Definitely, 2024 is a year of big discoveries and good projects in VR. Having said that, the future of VR gaming is still uncertain, so we will focus on what is already known. We have thoroughly researched the top VR games of 2023 and compiled our findings below. After reading, you'll likely be eager to grab a headset and dive into the action!

Cyber Exposure Management Meets the New SEC Reporting Requirements

The recent SEC breach disclosure rules place enormous pressure on CISOs. The new SEC disclosure requirements for public companies require companies to report annually on their cybersecurity risk management and governance efforts and publicly announce cybersecurity incidents that prove "material." Determining materiality may be one of organizations' most prominent challenges with the new rules. What exactly is a material cybersecurity incident?

Three-Quarters of Organizations Have Experienced Phishing Attack in the Last 12 Months

Regardless of whether your environment remains on-premise, resides in the cloud, or is a hybrid configuration, new data makes it clear that your biggest risk is phishing attacks. According to Netwrix’s 2023 Hybrid Security Trends Report, released late last month, 73% of organizations have some form of hybrid environment, with slightly less than half of all workloads (44%) residing in the cloud.

Women CyberSecurity Society Targeted by Smishing Campaign

The Canada-based Women CyberSecurity Society (WCS2) has warned that its leadership, members, and volunteers are being targeted by an SMS phishing (smishing) campaign, IT World Canada reports. “A volunteer recently reported receiving a text message claiming to be from founder Lisa Kearney citing an urgent need for help,” WCS2 says.

How To Calculate Cybersecurity ROI and Communicate It to Executives

Organizational leaders have generally viewed cybersecurity as a costly yet essential business function and recognize that Chief Information Security Officers (CISOs) and other cyber leaders make strategic decisions to safeguard the company's digital assets. Still, until recently, these higher-level executives have never sought to make sense of the technical cyber activities in a broader business context, believing their value to be too complex to discern. ‍

Machine Learning in Action - An In-Depth Look at Identifying Operating Systems Through a TCP/IP Based Model

In the previous post, we’ve discussed how passive OS identification can be done based on different network protocols. We’ve also used the OSI model to categorize the different indicators and prioritize them based on reliability and granularity. In this post, we will focus on the network and transport layers and introduce a machine learning OS identification model based on TCP/IP header values.