Disclaimer:
The RSS blog posts featured on our website are external articles imported through an automated process. We do not verify the accuracy or completeness of the information contained in these posts. The views and opinions expressed in these articles are those of the authors and do not necessarily reflect our own. We are not responsible for any errors, omissions, or misstatements that may appear in these posts. Readers are advised to independently verify any information before relying on it.
If you find any information that you believe to be dangerous, harmful, inaccurate, or in violation of GDPR or other laws, please contact us immediately, and we will take steps to remove it.
Cisco Talos: LilacSquid Threat Actor Targets Multiple Sectors Worldwide With PurpleInk Malware
Cyber Security BlogsFind out how the cyberespionage threat actor LilacSquid operates, and then learn how to protect your business from this security risk. Read More
- Published in RSS blog posts
Cisco Live 2024: New Unified Observability Experience Packages Cisco & Splunk Insight Tools
Cyber Security BlogsThe observability suite is the first major overhaul for Splunk products since the Cisco acquisition. Plus, Mistral AI makes a deal with Cisco’s incubator. Read More
- Published in RSS blog posts
Vulnerability in Cisco Webex cloud service exposed government authorities, companies
Cyber Security Blogs The vulnerability that allowed a German journalist to discover links to video conference meetings held by Bundeswehr (the German armed forces) and the Social Democratic Party of Germany (SPD) via their self-hosted Cisco Webex instances similarly affected the Webex cloud service. The Cisco Webex Meetings cloud vulnerability The vulnerability affected all organizations
- Published in RSS blog posts
CES: AI at the Forefront of Cybersecurity’s Future
Cyber Security Blogs Examining the Increased Use of Artificial Intelligence in Cybersecurity By Matthew Taylor, Vice President of Projects and Engineering, MxD The annual Consumer Electronics Show (CES) is the world’s largest consumer […] The post CES: AI at the Forefront of Cybersecurity’s Future appeared first on Cyber Defense Magazine. Read More
- Published in RSS blog posts
What Individuals Get Wrong About Business Email Compromise
Cyber Security Blogs Businesses tend to obsess over business email compromise. This obsession is misguided. Observations from the front lines of combating business email compromise at the SMB scale and what we should […] The post What Individuals Get Wrong About Business Email Compromise appeared first on Cyber Defense Magazine. Read More
- Published in RSS blog posts
AI Autonomy and the Future of Cybersecurity
Cyber Security BlogsHave you ever wondered how Artificial Intelligence (AI) could mimic consciousness and autonomously control various tasks? It sounds rather daunting. However, it may not be as intimidating as it seems under the right conditions. Moreover, Would AI perform tasks independently in the same manner as humans? And what implications does this hold for
- Published in RSS blog posts
Life in Cybersecurity: From the Classroom to the Next Generation of Cybersecurity Professional
Cyber Security BlogsWhen you speak with many of the seasoned veterans of cybersecurity, it is not unusual to learn of the twisted path in technology that eventually landed them in the security profession. However, the newest cybersecurity professionals are digital natives. They grew up in a world of technology and were exposed to cybersecurity as
- Published in RSS blog posts
A Brief Look at AI in the Workplace: Risks, Uses and the Job Market
Cyber Security BlogsAnyone remotely wired into technology newsfeeds – or any newsfeeds for that matter – will know that AI (artificial intelligence) is the topic of the moment. In the past 18 months alone, we’ve borne witness to the world’s first AI Safety Summit, a bizarre and highly public leadership drama at one of the
- Published in RSS blog posts
How Can FIM Protect Against Insider Threats
Cyber Security BlogsAn insider threat is someone inside an organization – including current and former employees, partners, and contractors – who, intentionally or otherwise, put their organization at risk. They typically abuse their access to private information and privileged accounts to steal or sabotage sensitive data, often for financial gain or even revenge. Organizations today
- Published in RSS blog posts
Understanding Vulnerability Management and Patch Management
Cyber Security BlogsVulnerability management and patch management are often confused. However, it’s crucial to recognize that, while complementary, they are distinct processes. Understanding the differences between vulnerability management and patch management is essential for a solid security posture. Let’s delve into the concepts to understand better what they are, how they differ, and how they
- Published in RSS blog posts










