Cyber for all - Page 7

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Top Ten Cybersecurity Misconfigurations
Top Ten Cybersecurity Misconfigurations

The NSA and CISA have created the Top 10 cybersecurity misconfigurations to help companies mitigate vulnerabilities If in the 20th century, many American movies, series and books t[...]

Read more
RDDoS attacks and DDoS-as-a-Service: Extortion and Business Continuity
RDDoS attacks and DDoS-as-a-Service: Extortion and Business Continuity

RDDoS attacks pose a growing threat to all kinds of companies which see their business continuity threatened by criminals As we have learned from mafia movies, from The Godfather t[...]

Read more
Cyberattacks against the healthcare sector put people’s well-being at risk
Cyberattacks against the healthcare sector put people’s well-being at risk

Cyberattacks against the healthcare sector have economic consequences and can affect people’s well-being At the beginning of the year, and within days of each other, one of S[...]

Read more
Cyber resilience. A concept that combines security and business
Cyber resilience. A concept that combines security and business

Companies must have strategies to improve cyber resilience and ensure business continuity during attacks A few days ago, the Spanish National Police warned about a new distribution[...]

Read more
Best practices in cybersecurity for AI
Best practices in cybersecurity for AI

ENISA has developed a framework to help companies implement the best practices in cybersecurity for AI The company Worldcoin, created by the founder of ChatGPT, has made an AI syst[...]

Read more
Top 10 vulnerabilities in LLM applications such as ChatGPT
Top 10 vulnerabilities in LLM applications such as ChatGPT

OWASP has published a ranking of the top vulnerabilities in LLM applications to help companies strengthen the security of generative AI If one technology has captured the public[...]

Read more
What are the AI security risks?
What are the AI security risks?

Artificial Intelligence is set to revolutionize our economy and way of life. But… What are the AI security risks? What literature or movies raised as a possibility for decade[...]

Read more
OWASP SAMM: Assessing and Improving Enterprise Software Security
OWASP SAMM: Assessing and Improving Enterprise Software Security

OWASP SAMM is a model that helps companies assess their software security posture and implement a strategy to optimize it The Lace Tempest ransomware group, notorious for using Cl0[...]

Read more
The 4 keys to the NIST Cybersecurity Framework v2
The 4 keys to the NIST Cybersecurity Framework v2

NIST Cybersecurity Framework v2 focuses on the importance of governance and supply chain in reducing security risks At the speed of the world moving today, enormous transformations[...]

Read more
DevSecOps: Producing software quickly, continuously, and securely
DevSecOps: Producing software quickly, continuously, and securely

DevSecOps is a model that enables software development companies to integrate security throughout the software lifecycle When do software applications need to be secured? The answe[...]

Read more
1 4 5 6 7 8 9 10 14