Cyber for all - Page 7
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective
Best practices in cybersecurity for AI
ENISA has developed a framework to help companies implement the best practices in cybersecurity for AI The company Worldcoin, created by the founder of ChatGPT, has made an AI syst[...]
Read moreTop 10 vulnerabilities in LLM applications such as ChatGPT
OWASP has published a ranking of the top vulnerabilities in LLM applications to help companies strengthen the security of generative AI If one technology has captured the public[...]
Read moreWhat are the AI security risks?
Artificial Intelligence is set to revolutionize our economy and way of life. But… What are the AI security risks? What literature or movies raised as a possibility for decade[...]
Read moreOWASP SAMM: Assessing and Improving Enterprise Software Security
OWASP SAMM is a model that helps companies assess their software security posture and implement a strategy to optimize it The Lace Tempest ransomware group, notorious for using Cl0[...]
Read moreThe 4 keys to the NIST Cybersecurity Framework v2
NIST Cybersecurity Framework v2 focuses on the importance of governance and supply chain in reducing security risks At the speed of the world moving today, enormous transformations[...]
Read moreDevSecOps: Producing software quickly, continuously, and securely
DevSecOps is a model that enables software development companies to integrate security throughout the software lifecycle When do software applications need to be secured? The answe[...]
Read moreSSVC: How to make decisions about IT vulnerabilities
SSVC is a system that helps to analyze vulnerabilities to make decisions that prevent security incidents and contain their consequences The BBC, British Airways, the US Department [...]
Read moreWhat are advanced persistent threats?
Advanced persistent threat groups seek to access critical information and destabilize companies in critical sectors and public administrations The era of the cautious and silent sp[...]
Read moreOWASP API Security Top 10
The OWASP API Security Top 10 highlights the top vulnerabilities in application programming interfaces Few acronyms are more relevant to explain the digitization of our world than [...]
Read moreDetecting emerging vulnerabilities before they are exploited
Companies must detect emerging vulnerabilities affecting their assets and anticipate the actions of cybercriminals In May, Barracuda, a company specializing in security solutions f[...]
Read more