How to steal a billion IDs and Passwords and how to prevent it – Trust Architecture
I’m not sure the exact numbers, but browser providers these days are providing the very useful, ability to share your […]
I’m not sure the exact numbers, but browser providers these days are providing the very useful, ability to share your […]
A new tactic appears to have arisen in the use of generative AI in social media. This tactic is comprised
The truth is the hyperbole about AI is largely based on a lie. But that has always been true! A
Perhaps because more higher impact incidents are making the media these days. Perhaps there is an actual increase in threat
We are all imperfect messengers. And while I appreciate that many of our more sensible (from my perspective) messages are
People who don’t have to do it seem to not understand the nature of the cyber threat. This very short
I was at a meeting last week discussing how AI models might be used to support archives for efficiency, effectiveness,
Of course until you are successfully attacked, doing nothing about security is a great approach. It saves money and time
I very often see false choices about paths forward. One of the most common ones is the question about the
Many years ago, Gartner declared “Firewalls are Dead”, but some 20 years later (give or take) they are still reporting
How is an application program interface different from an other application interface? At a basic level, they are the same
Privilege escalation has always been a problem in computers, and after all these years, we still don’t seem to have