PinnedTop 25 Cyber Security NewslettersPeriodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events…Sep 5, 20222Sep 5, 20222
PinnedAnatomy of Automated Account Takeoversbad bots can be considered the permanent residents of the digital world with just one step away from being official dominant digital…Apr 21, 2020Apr 21, 2020
How AI is Driving CrowdStrike ($CRWD) to 36% Growth & Market LeadershipThe Awesome Cybersecurity Stocks project provides an overview of publicly traded cybersecurity vendors, grouped into 18 solution areas…1d ago1d ago
13 Key Principles for Securing AI SystemsAs artificial intelligence (AI) adoption accelerates across industries, so do security risks. Unlike traditional IT security, AI introduces…6d ago6d ago
Published inAI Security HubAttacks on Generative AI Data and Using Vector Encryption to Stop ThemJan 19Jan 19
Published inWeb3 Security HubBlockchain Framework for Managing Third-Party Vendor RisksOrganizations increasingly rely on third-party vendors, but managing these relationships effectively requires addressing security…Jan 18Jan 18
Published inWeb3 Security HubUncovering the Limitations of DeFi Security ToolsThe study “Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?” analyzes 127 high-impact DeFi attacks…Jan 18Jan 18
Published inAI Security HubTechnical Insights from Testing Microsoft 365 Copilot🔧 Study ObjectiveJan 17Jan 17
Published inAI Security Hub54% Success Rate: The Rise of AI-Powered Spear-PhishingLarge language models have significantly advanced spear-phishing, achieving a 54% success rate — on par with human-crafted emails. This…Jan 17Jan 17