security technologies
ChatGPT for Offensive Security: Five Attacks
ChatGPT is an AI chatbot that uses Natural Language Processing (NLP) combined with the GPT-3 framework to provide human-like responses. NLP allows the model to… ...
The CISO Perspective 2023-02-20 09:19:54
At one point, virtual private networks (VPNs) were a valuable tool for remote workers to access private networks and data centers. But with more and… ...
What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained
Virtual Private Networks (VPNs) have been used for years to provide remote connectivity, but they have limitations in terms of scalability and security. A technology… ...
Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA
Hacking 2FA and MFA When MFA is implemented correctly, it can be an extremely powerful and low-cost way to protect against the weakest link in… The post Hacking Two Factor Authentication: Four ...
What is AIOps and MLOps? Artificial Intelligence for IT Operations Explained
What is AIOPs? Artificial Intelligence for IT Operations, or AIOps, is a term coined by Gartner to describe a class of technology that utilizes machine… The post What is AIOps and MLOps? ...
What is XDR vs EDR vs MDR? Extended Detection and Response Explained
EDR and XDR: What Do They Do? Dwell time refers to the length of time an attacker is able to roam free on your network… The post What is XDR vs EDR ...
What is Machine Learning ? A.I., Models, Algorithm and Learning Explained
What is Machine Learning? Machine learning has been referred to as “the science of getting computers to act without being explicitly programmed.” What is machine… The post What is Machine Learning ? ...
What Is SASE? Secure Access Service Edge Explained
Secure Access Service Edge, or SASE, is a term coined by Gartner that combines multiple network and security technologies into a single offering. The goal… The post What Is SASE? Secure Access ...
Side-Channel Attacks: Cyber Warfare’s New Battleground
The current state of cybersecurity is complex, fast-moving and a critical risk to all organizations. Understanding where U.S. businesses stack up in terms of their security knowledge and defense strategy is of ...
The Moonshot Information Security Project
Recently, I was reading about the U.S. government considering funding a “moonshot” information security project—that is, like the efforts in the 1960s to reach the moon (before the Soviets), abandon incrementalism in ...