Article: No evidence of personal data leak amid national security probe: NHIA - published over 1 year ago. Content: https://www.databreaches.net/no-evidence-of-personal-data-leak-amid-national-security-probe-nhia/ Published: 2023 01 19 19:41:27 Received: 2023 01 19 19:45:35 Feed: DataBreaches.net Source: DataBreaches.net Category: Data Breaches Topic: Data Breaches |
Article: Digital Rights Updates with EFFector 35.1 - published over 1 year ago. Content: https://www.eff.org/deeplinks/2023/01/digital-rights-updates-effector-351 Published: 2023 01 17 21:48:41 Received: 2023 01 19 19:44:03 Feed: Deeplinks Source: Deeplinks Category: Cyber Security Topic: Cyber Security |
|
Article: The Data Lakehouse Post 2 – The Data Lakehouse Itself - published over 3 years ago. Content: In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do. In this post, I am going to talk a bit about the concept of the Data Lakehouse. The term ‘data lakehouse‘ has been making the rounds in the data and analytics space for a couple of years. It d... https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-2-the-data-lakehouse-itself/ Published: 2021 02 08 16:22:11 Received: 2023 01 19 19:41:17 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
|
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published over 3 years ago. Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of. Let’s start with the lowest laye... https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/ Published: 2021 02 08 16:25:58 Received: 2023 01 19 19:41:17 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
Article: A Security Product Reference Model - published about 3 years ago. Content: On a recent consulting engagement with Cynergy Partners, we needed to decipher the security product market to an investment firm that normally doesn’t invest in cyber security. One of the investor’s concerns was that a lot of cyber companies are short-lived businesses due to the threats changing so drastically quick. One day it’s ransomware X, the next day i... https://raffy.ch/blog/2021/04/16/a-security-product-reference-model/ Published: 2021 04 16 21:30:24 Received: 2023 01 19 19:41:17 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
|
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published almost 3 years ago. Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti... https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/ Published: 2021 05 19 22:04:11 Received: 2023 01 19 19:41:17 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
|
Article: How To Drive Value with Security Data - published almost 3 years ago. Content: We have been collecting data to drive security insights for over two decades. We call these tools log management solutions, SIMs (security information management), and XDRs (extended detection and response) platforms. Some companies have also built their own solutions on top of big data technologies. It’s been quite the journey. At the upcoming ThinkIn co... https://raffy.ch/blog/2021/06/03/how-to-drive-value-with-security-data/ Published: 2021 06 03 16:55:18 Received: 2023 01 19 19:41:17 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
Article: A Logging History Lesson – From syslogd(8) to XDR - published almost 3 years ago. Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal... https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/ Published: 2021 06 08 16:05:55 Received: 2023 01 19 19:41:16 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
|
Article: How To Drive Value with Security Data – The Full Talk - published almost 3 years ago. Content: Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and information. The solution vendors have initially named the space log management and then security informatio... https://raffy.ch/blog/2021/06/12/how-to-drive-value-with-security-data-the-full-talk/ Published: 2021 06 12 20:00:24 Received: 2023 01 19 19:41:16 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
|
Article: *NIX Command Line Foo - published over 1 year ago. Content: Well, not one of my normal blog posts, but I hope some of you geeks out there will find this useful anyways. I will definitely use this post as a reference frequently. I have been using various flavors of UNIX and their command lines from ksh to bash and zsh for over 25 years and there is always something new to learn to make me faster at the jobs I am do... https://raffy.ch/blog/2022/11/27/nix-command-line-foo/ Published: 2022 11 27 17:28:05 Received: 2023 01 19 19:41:16 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
Article: Ransomware gang steals data from KFC, Taco Bell, and Pizza Hut brand owner - published over 1 year ago. Content: https://www.bleepingcomputer.com/news/security/ransomware-gang-steals-data-from-kfc-taco-bell-and-pizza-hut-brand-owner/ Published: 2023 01 19 19:21:11 Received: 2023 01 19 19:24:17 Feed: Bleeping Computer - All News Feeds Source: Bleeping Computer Category: News Topic: Cyber Security |
|
Article: Have You Tried Turning It Off and On Again: Rethinking Tech Regulation and Creative Labor - published over 1 year ago. Content: https://www.eff.org/deeplinks/2023/01/have-you-tried-turning-it-and-again-rethinking-tech-regulation-and-creative-labor Published: 2023 01 19 19:16:45 Received: 2023 01 19 19:23:57 Feed: Deeplinks Source: Deeplinks Category: Cyber Security Topic: Cyber Security |
|
Article: Aerleon a vendor agnostic firewall management system - published over 1 year ago. Content: submitted by /u/ankenyr [link] [comments] https://www.reddit.com/r/netsec/comments/10g9qss/aerleon_a_vendor_agnostic_firewall_management/ Published: 2023 01 19 18:49:43 Received: 2023 01 19 19:22:33 Feed: /r/netsec - Information Security News and Discussion Source: /r/netsec - Information Security News and Discussion Category: Cyber Security Topic: Cyber Security |
Article: CVE-2023-0406 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0406 Published: 2023 01 19 18:15:15 Received: 2023 01 19 19:15:12 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2022-47745 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47745 Published: 2023 01 19 18:15:15 Received: 2023 01 19 19:15:06 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2022-47740 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47740 Published: 2023 01 19 18:15:14 Received: 2023 01 19 19:15:06 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2022-47197 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47197 Published: 2023 01 19 18:15:14 Received: 2023 01 19 19:15:06 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2022-47196 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47196 Published: 2023 01 19 18:15:14 Received: 2023 01 19 19:15:06 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2022-47195 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47195 Published: 2023 01 19 18:15:14 Received: 2023 01 19 19:15:06 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2022-47194 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47194 Published: 2023 01 19 18:15:13 Received: 2023 01 19 19:15:06 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2022-40697 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40697 Published: 2023 01 19 17:15:12 Received: 2023 01 19 19:14:56 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2022-39167 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39167 Published: 2023 01 19 17:15:11 Received: 2023 01 19 19:14:55 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2022-1676 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1676 Published: 2023 01 19 17:15:11 Received: 2023 01 19 19:14:50 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2020-25714 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25714 Published: 2023 01 19 18:15:11 Received: 2023 01 19 19:14:47 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2020-25679 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25679 Published: 2023 01 19 18:15:11 Received: 2023 01 19 19:14:47 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2020-1715 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1715 Published: 2023 01 19 18:15:11 Received: 2023 01 19 19:14:47 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2020-1713 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1713 Published: 2023 01 19 17:15:11 Received: 2023 01 19 19:14:47 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2020-10765 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10765 Published: 2023 01 19 18:15:11 Received: 2023 01 19 19:14:47 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2020-10764 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10764 Published: 2023 01 19 18:15:10 Received: 2023 01 19 19:14:47 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2020-10694 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10694 Published: 2023 01 19 18:15:10 Received: 2023 01 19 19:14:47 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2020-10692 - published over 1 year ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10692 Published: 2023 01 19 18:15:10 Received: 2023 01 19 19:14:47 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: Shift Identity Left: Preventing Identity-Based Breaches - published over 1 year ago. Content: https://www.darkreading.com/cloud/shift-identity-left-preventing-identity-based-breaches Published: 2023 01 19 18:35:00 Received: 2023 01 19 19:04:24 Feed: Dark Reading: Source: Dark Reading Category: News Topic: Cyber Security |
|
Article: Roaming Mantis Uses DNS Changers to Target Users via Compromised Public Routers - published over 1 year ago. Content: https://www.darkreading.com/remote-workforce/roaming-mantis-uses-dns-changers-to-target-users-via-compromised-public-routers Published: 2023 01 19 18:54:00 Received: 2023 01 19 19:04:24 Feed: Dark Reading: Source: Dark Reading Category: News Topic: Cyber Security |
|
Article: 7 factors influencing global enterprise risk & resilience in 2023 - published over 1 year ago. Content: https://www.securitymagazine.com/articles/98806-7-factors-influencing-global-enterprise-risk-and-resilience-in-2023 Published: 2023 01 19 05:00:00 Received: 2023 01 19 19:03:43 Feed: Security Magazine – All Feeds Source: Security Magazine Category: News Topic: Security |
Click to Open Code Editor