5 Steps to Assessing Risk Profiles of Third-Party SSE Platforms - It’s crucial to thoroughly assess the risk profiles of various SSE platforms and weigh their suitability against their organization’s risk tolerance before adopting SSE. (Etay Maor)
Threat Intel: To Share or Not to Share is Not the Question - To share or not to share threat intelligence isn’t the question. It’s how to share, what to share, where and with whom. (Marc Solomon)
Addressing the State of AI’s Impact on Cyber Disinformation / Misinformation - By embracing a strategy that combines technological advancements with critical thinking skills, collaboration, and a culture of continuous learning, organizations can safeguard against AI’s disruptive effects. (Rik Ferguson)
Offense Intended: How Adversarial Emulation Went From State Secret To Board Bullet Point - Offensive Security does not focus on discreet attacks, singular actors, or Indicators of compromise, but understands the entirety of both sides of the battlefield. (Tom Eston) |
No comments:
Post a Comment
Please leave a comment about our recent post.