Can Artificial Intelligence build your information security program? Probably not (yet!)
One of the most widely discussed tools to be released recently is the ChatGPT released by OpenAI, an artificial intelligence chat bot...
One of the most widely discussed tools to be released recently is the ChatGPT released by OpenAI, an artificial intelligence chat bot...
Presentation given at CypherCon, March 31, 2023 In 2022, email compromises were one the costliest forms of cybercrime reported to the...
Here are the slides and playbooks discussed in the BlueTeamCon presentation, "Easy Playbooks to Make Ransomware Criminals Cry" on August...
The dawn of music on television led to the rise of big bands with big personalities in the 1980s. One of the biggest acts of that era was...
With many free email providers you get what you pay for in terms of logging data that can be used if the bad guys get access.
Folks who work in the technology and cybersecurity industry often use specialized language and lingo to talk about their jobs. For those...
It seems like everywhere you go there’s a new requirement to give out your email address for contact information. Many of those places...
Threat actors deploying ransomware typically gain access to victims’ networks through either phishing emails that get them access to a...