Anker Elite · @anker
63 followers · 27 posts · Server me.dm

Navigating the AI maze? πŸ€– Take note: Vendor vetting is your new bible πŸ“‹, and balancing employee trust with security is the tightrope you'll walk. πŸ› οΈβš–οΈ One wrong move, and you're in a sea of sharks. 🦈 Navigate wisely!

πŸƒ 🌐 go.digitalengineer.io/QA

#dataprivacy #airegulations #enterprisesecurity

Last updated 1 year ago

Geekmaster πŸ‘½:system76: · @Geekmaster
191 followers · 1373 posts · Server ioc.exchange

is a thing. I've talked about it before, and this article supports every theory I've mentioned over the years. are using to create sophisticated campaigns, , and lowers the entry for new cyber criminals and especially or people with zero technical experience to create and commit malicious fraud campaigns against a much wider swath of targets than ever before. The ONLY way to combat these emerging threats is through user awareness trainings and a approach to your security platform for . For yourselves personally - invest in a solid solution, whether that's Microsoft's (consumer version), or a platform like who is affordable, very good, and works on desktop and mobile. You also want to look into a to protect your data streams. These DarkAI's aren't here to play, they are here to cause chaos. and !!

darkreading.com/application-se

#darkai #cybercriminals #generativeAI #bec #novelmalware #scriptkiddies #defenseindepth #enterprisesecurity #antivirus #defender #avast #vpn #becyberaware #becybersafe #dontgetphished

Last updated 1 year ago

Stephen Foskett · @sfoskett
939 followers · 2131 posts · Server techfieldday.net

: The article acknowledges the difficulties of securing an enterprise environment, emphasizing the expense, complexity, and underappreciation of the task, and provides insights and practical advice from a recent Security Tech Field Day event. @alex
yobyot.com/cloud/security-is-h
@Yobyot

#SymLink #securitychallenges #enterprisesecurity #itsecurity #xfd9 #roundtable

Last updated 1 year ago

Jerry Lee · @yesonline
27 followers · 9774 posts · Server mastodon.social

RT @SGNL_ai: While RBAC is good for slower moving data, and ABAC adds some dynamism through direct value comparisons, JITAM really provides fine-grained . See the real-world analogy here:
t.co/fop8xgDz6j

#accesscontrol #cybersec #itsecurity #enterprisesecurity

Last updated 2 years ago

Larry Villella · @villox
32 followers · 114 posts · Server infosec.exchange

I don’t know if this is true but ChatGPT claims it is: Did you know that over 50% of cyberattacks on enterprises come from insiders, not external hackers? Protect your business with strong insider threat detection and prevention strategies.

#enterprisesecurity #cybersecurity #chatgpt

Last updated 2 years ago

Over the next few months I will be redesigning our Splunk ES from the ground up.

Any recommendations on the best data sources to bring in from a security monitoring perspective?

Currently have FW, Proxy, Email, AV, remote access, auth logs. Mostly a windows shop.

Have scope to bring in a lot more sources now...

#splunk #enterprisesecurity

Last updated 2 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
The Hacker News · @thehackernews
402 followers · 2779 posts · Server social.tchncs.de
The Hacker News · @thehackernews
402 followers · 2779 posts · Server social.tchncs.de
The Hacker News · @thehackernews
402 followers · 2779 posts · Server social.tchncs.de
The Hacker News · @thehackernews
402 followers · 2779 posts · Server social.tchncs.de
The Hacker News · @thehackernews
402 followers · 2779 posts · Server social.tchncs.de
The Hacker News · @thehackernews
402 followers · 2779 posts · Server social.tchncs.de