All Articles

Ordered by Date Received : Year: "2024" Month: "03" Day: "14" Hour: "12"
Page: 1 (of 0)

Total Articles in this collection: 19

Navigation Help at the bottom of the page
Article: Concentric AI introduces Copilot data risk module - published about 2 months ago.
Content:
https://www.helpnetsecurity.com/2024/03/14/concentric-ai-copilot-data-risk-module/   
Published: 2024 03 14 12:41:46
Received: 2024 03 14 12:59:51
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Concentric AI introduces Copilot data risk module - published about 2 months ago.
Content:
https://www.helpnetsecurity.com/2024/03/14/concentric-ai-copilot-data-risk-module/   
Published: 2024 03 14 12:41:46
Received: 2024 03 14 12:59:51
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Skill Levels in Digital Security - published about 4 years ago.
Content: Two posts in one day? These are certainly unusual times. I was thinking about words to describe different skill levels in digital security. Rather than invent something, I decided to review terms that have established meaning. Thanks to Google Books I found this article in a 1922 edition of the Archives of Psychology that mentioned four key terms: The ...
https://taosecurity.blogspot.com/2020/03/skill-levels-in-digital-security.html   
Published: 2020 03 27 15:15:00
Received: 2024 03 14 12:46:09
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: Skill Levels in Digital Security - published about 4 years ago.
Content: Two posts in one day? These are certainly unusual times. I was thinking about words to describe different skill levels in digital security. Rather than invent something, I decided to review terms that have established meaning. Thanks to Google Books I found this article in a 1922 edition of the Archives of Psychology that mentioned four key terms: The ...
https://taosecurity.blogspot.com/2020/03/skill-levels-in-digital-security.html   
Published: 2020 03 27 15:15:00
Received: 2024 03 14 12:46:09
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Seeing Book Shelves on Virtual Calls - published about 4 years ago.
Content: I have a confession... for me, the best part of virtual calls, or seeing any reporter or commentator working for home, is being able to check out their book shelves. I never use computer video, because I want to preserve the world's bandwidth. That means I don't share what my book shelves look like when I'm on a company call. Therefore, I thought I'd shar...
https://taosecurity.blogspot.com/2020/04/seeing-book-shelves-on-virtual-calls.html   
Published: 2020 04 02 23:03:00
Received: 2024 03 14 12:46:08
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: Seeing Book Shelves on Virtual Calls - published about 4 years ago.
Content: I have a confession... for me, the best part of virtual calls, or seeing any reporter or commentator working for home, is being able to check out their book shelves. I never use computer video, because I want to preserve the world's bandwidth. That means I don't share what my book shelves look like when I'm on a company call. Therefore, I thought I'd shar...
https://taosecurity.blogspot.com/2020/04/seeing-book-shelves-on-virtual-calls.html   
Published: 2020 04 02 23:03:00
Received: 2024 03 14 12:46:08
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: If You Can't Patch Your Email Server, You Should Not Be Running It - published about 4 years ago.
Content: CVE-2020-0688 Scan Results, per Rapid7 tl;dr -- it's the title of the post: "If You Can't Patch Your Email Server, You Should Not Be Running It." I read a disturbing story today with the following news: "Starting March 24, Rapid7 used its Project Sonar internet-wide survey tool to discover all publicly-facing Exchange servers on the Internet and the nu...
https://taosecurity.blogspot.com/2020/04/if-you-cant-patch-your-email-server-you.html   
Published: 2020 04 07 15:28:00
Received: 2024 03 14 12:46:08
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: If You Can't Patch Your Email Server, You Should Not Be Running It - published about 4 years ago.
Content: CVE-2020-0688 Scan Results, per Rapid7 tl;dr -- it's the title of the post: "If You Can't Patch Your Email Server, You Should Not Be Running It." I read a disturbing story today with the following news: "Starting March 24, Rapid7 used its Project Sonar internet-wide survey tool to discover all publicly-facing Exchange servers on the Internet and the nu...
https://taosecurity.blogspot.com/2020/04/if-you-cant-patch-your-email-server-you.html   
Published: 2020 04 07 15:28:00
Received: 2024 03 14 12:46:08
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: New Book! The Best of TaoSecurity Blog, Volume 1 - published about 4 years ago.
Content: I'm very pleased to announce that I've published a new book! It's The Best of TaoSecurity Blog, Volume 1: Milestones, Philosophy and Strategy, Risk, and Advice. It's available now in the Kindle Store, and if you're a member of Kindle Unlimited, it's currently free. I may also publish a print version. If you're interested, please tell me on Twitter. ...
https://taosecurity.blogspot.com/2020/05/new-book-best-of-taosecurity-blog.html   
Published: 2020 05 04 15:51:00
Received: 2024 03 14 12:46:08
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: New Book! The Best of TaoSecurity Blog, Volume 1 - published about 4 years ago.
Content: I'm very pleased to announce that I've published a new book! It's The Best of TaoSecurity Blog, Volume 1: Milestones, Philosophy and Strategy, Risk, and Advice. It's available now in the Kindle Store, and if you're a member of Kindle Unlimited, it's currently free. I may also publish a print version. If you're interested, please tell me on Twitter. ...
https://taosecurity.blogspot.com/2020/05/new-book-best-of-taosecurity-blog.html   
Published: 2020 05 04 15:51:00
Received: 2024 03 14 12:46:08
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: I Did Not Write This Book - published almost 4 years ago.
Content: Fake Book  Someone published a "book" on Amazon and claimed that I wrote it! I had NOTHING to do with this. I am working with Amazon now to remove it, or at least remove my name. Stay away from this garbage! Update: Thankfully, within a day or so of this post, the true author of this work removed it from Amazon. It has not returned, at least as far as...
https://taosecurity.blogspot.com/2020/07/i-did-not-write-this-book.html   
Published: 2020 07 16 15:04:00
Received: 2024 03 14 12:46:08
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: I Did Not Write This Book - published almost 4 years ago.
Content: Fake Book  Someone published a "book" on Amazon and claimed that I wrote it! I had NOTHING to do with this. I am working with Amazon now to remove it, or at least remove my name. Stay away from this garbage! Update: Thankfully, within a day or so of this post, the true author of this work removed it from Amazon. It has not returned, at least as far as...
https://taosecurity.blogspot.com/2020/07/i-did-not-write-this-book.html   
Published: 2020 07 16 15:04:00
Received: 2024 03 14 12:46:08
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: New Book! The Best of TaoSecurity Blog, Volume 2 - published over 3 years ago.
Content:  I published a new book!The Best of TaoSecurity Blog, Volume 2: Network Security Monitoring, Technical Notes, Research, and China and the Advanced Persistent ThreatIt's in the Kindle Store, and if you're Unlimited it's free. Print edition to follow.The book lists as having 413 pages (for the Kindle edition at least) at it's almost 95,000 words. I started wor...
https://taosecurity.blogspot.com/2020/09/new-book-best-of-taosecurity-blog.html   
Published: 2020 09 01 12:30:00
Received: 2024 03 14 12:46:08
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: New Book! The Best of TaoSecurity Blog, Volume 2 - published over 3 years ago.
Content:  I published a new book!The Best of TaoSecurity Blog, Volume 2: Network Security Monitoring, Technical Notes, Research, and China and the Advanced Persistent ThreatIt's in the Kindle Store, and if you're Unlimited it's free. Print edition to follow.The book lists as having 413 pages (for the Kindle edition at least) at it's almost 95,000 words. I started wor...
https://taosecurity.blogspot.com/2020/09/new-book-best-of-taosecurity-blog.html   
Published: 2020 09 01 12:30:00
Received: 2024 03 14 12:46:08
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: Greg Rattray Invented the Term Advanced Persistent Threat - published over 3 years ago.
Content:  I was so pleased to read this Tweet yesterday from Greg Rattray:"Back in 2007, I coined the term “Advanced Persistent Threat” to characterize emerging adversaries that we needed to work with the defense industrial base to deal with... Since then both the APT term and the nature of our adversaries have evolved. What hasn’t changed is that in cyberspace, adva...
https://taosecurity.blogspot.com/2020/10/greg-rattray-invented-term-advanced.html   
Published: 2020 10 10 15:30:00
Received: 2024 03 14 12:46:08
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: Greg Rattray Invented the Term Advanced Persistent Threat - published over 3 years ago.
Content:  I was so pleased to read this Tweet yesterday from Greg Rattray:"Back in 2007, I coined the term “Advanced Persistent Threat” to characterize emerging adversaries that we needed to work with the defense industrial base to deal with... Since then both the APT term and the nature of our adversaries have evolved. What hasn’t changed is that in cyberspace, adva...
https://taosecurity.blogspot.com/2020/10/greg-rattray-invented-term-advanced.html   
Published: 2020 10 10 15:30:00
Received: 2024 03 14 12:46:08
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: MITRE ATT&CK Tactics Are Not Tactics - published over 3 years ago.
Content: Just what are "tactics"?IntroductionMITRE ATT&CK is a great resource, but something about it has bothered me since I first heard about it several years ago. It's a minor point, but I wanted to document it in case it confuses anyone else.The MITRE ATT&CK Design and Philosophy document from March 2020 says the following:At a high-level, ATT&CK is a...
https://taosecurity.blogspot.com/2020/10/mitre-att-tactics-are-not-tactics.html   
Published: 2020 10 23 14:00:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: MITRE ATT&CK Tactics Are Not Tactics - published over 3 years ago.
Content: Just what are "tactics"?IntroductionMITRE ATT&CK is a great resource, but something about it has bothered me since I first heard about it several years ago. It's a minor point, but I wanted to document it in case it confuses anyone else.The MITRE ATT&CK Design and Philosophy document from March 2020 says the following:At a high-level, ATT&CK is a...
https://taosecurity.blogspot.com/2020/10/mitre-att-tactics-are-not-tactics.html   
Published: 2020 10 23 14:00:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Security and the One Percent: A Thought Exercise in Estimation and Consequences - published over 3 years ago.
Content: There's a good chance that if you're reading this post, you're the member of an exclusive club. I call it the security one percent, or the security 1% or #securityonepercent on Twitter. This is shorthand for the assortment of people and organizations who have the personnel, processes, technology, and support to implement somewhat robust digital security prog...
https://taosecurity.blogspot.com/2020/10/security-and-one-percent-thought.html   
Published: 2020 10 31 20:11:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: Security and the One Percent: A Thought Exercise in Estimation and Consequences - published over 3 years ago.
Content: There's a good chance that if you're reading this post, you're the member of an exclusive club. I call it the security one percent, or the security 1% or #securityonepercent on Twitter. This is shorthand for the assortment of people and organizations who have the personnel, processes, technology, and support to implement somewhat robust digital security prog...
https://taosecurity.blogspot.com/2020/10/security-and-one-percent-thought.html   
Published: 2020 10 31 20:11:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: New Book! The Best of TaoSecurity Blog, Volume 3 - published over 3 years ago.
Content:  Introduction I published a new book!The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices is the third title in the TaoSecurity Blog series. It's in the Kindle Store, and if you have an Unlimited account, it's free. I also published a print edition, which is 485 pages. Book DescriptionThe book features the followi...
https://taosecurity.blogspot.com/2020/11/new-book-best-of-taosecurity-blog.html   
Published: 2020 11 09 13:30:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: New Book! The Best of TaoSecurity Blog, Volume 3 - published over 3 years ago.
Content:  Introduction I published a new book!The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices is the third title in the TaoSecurity Blog series. It's in the Kindle Store, and if you have an Unlimited account, it's free. I also published a print edition, which is 485 pages. Book DescriptionThe book features the followi...
https://taosecurity.blogspot.com/2020/11/new-book-best-of-taosecurity-blog.html   
Published: 2020 11 09 13:30:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Digital Offense Capabilities Are Currently Net Negative for the Security Ecosystem - published about 3 years ago.
Content: PropositionDigital offense capabilities are currently net negative for the security ecosystem.[0]The costs of improved digital offense currently outweigh the benefits. The legitimate benefits of digital offense accrue primarily to the security one percent (#securityonepercent), and to intelligence, military, and law enforcement agencies. The derived defensiv...
https://taosecurity.blogspot.com/2021/02/digital-offense-capabilities-are.html   
Published: 2021 02 18 15:30:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: Digital Offense Capabilities Are Currently Net Negative for the Security Ecosystem - published about 3 years ago.
Content: PropositionDigital offense capabilities are currently net negative for the security ecosystem.[0]The costs of improved digital offense currently outweigh the benefits. The legitimate benefits of digital offense accrue primarily to the security one percent (#securityonepercent), and to intelligence, military, and law enforcement agencies. The derived defensiv...
https://taosecurity.blogspot.com/2021/02/digital-offense-capabilities-are.html   
Published: 2021 02 18 15:30:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: The Origins of the Names TaoSecurity and the Unit Formerly Known as TAO - published about 3 years ago.
Content:  What are the origins of the names TaoSecurity and the unit formerly known as TAO? IntroductionI've been reading Nicole Perlroth's new book This Is How They Tell Me the World Ends. Her discussion of the group formerly known as Tailored Access Operations, or TAO, reminded me of a controversy that arose in the 2000s. I had heard through back channels that some...
https://taosecurity.blogspot.com/2021/04/the-origins-of-names-taosecurity-and.html   
Published: 2021 04 01 18:00:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: The Origins of the Names TaoSecurity and the Unit Formerly Known as TAO - published about 3 years ago.
Content:  What are the origins of the names TaoSecurity and the unit formerly known as TAO? IntroductionI've been reading Nicole Perlroth's new book This Is How They Tell Me the World Ends. Her discussion of the group formerly known as Tailored Access Operations, or TAO, reminded me of a controversy that arose in the 2000s. I had heard through back channels that some...
https://taosecurity.blogspot.com/2021/04/the-origins-of-names-taosecurity-and.html   
Published: 2021 04 01 18:00:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: New Book! The Best of TaoSecurity Blog, Volume 4 - published about 3 years ago.
Content:  I've completed the TaoSecurity Blog book series.The new book is The Best of TaoSecurity Blog, Volume 4: Beyond the Blog with Articles, Testimony, and Scholarship. It's available now for Kindle, and I'm working on the print edition. I'm running a 50% off promo on Volumes 1-3 on Kindle through midnight 20 April. Take advantage before the prices go back up.I d...
https://taosecurity.blogspot.com/2021/04/new-book-best-of-taosecurity-blog.html   
Published: 2021 04 13 15:00:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: New Book! The Best of TaoSecurity Blog, Volume 4 - published about 3 years ago.
Content:  I've completed the TaoSecurity Blog book series.The new book is The Best of TaoSecurity Blog, Volume 4: Beyond the Blog with Articles, Testimony, and Scholarship. It's available now for Kindle, and I'm working on the print edition. I'm running a 50% off promo on Volumes 1-3 on Kindle through midnight 20 April. Take advantage before the prices go back up.I d...
https://taosecurity.blogspot.com/2021/04/new-book-best-of-taosecurity-blog.html   
Published: 2021 04 13 15:00:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Zeek in Action Videos - published almost 3 years ago.
Content: This is a quick note to point blog readers to my Zeek in Action YouTube video series for the Zeek network security monitoring project. Each video addresses a topic that I think might be of interest to people trying to understand their network using Zeek and adjacent tools and approaches, like Suricata, Wireshark, and so on. I am especially pleased with Video...
https://taosecurity.blogspot.com/2021/07/zeek-in-action-videos.html   
Published: 2021 07 29 18:34:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: Zeek in Action Videos - published almost 3 years ago.
Content: This is a quick note to point blog readers to my Zeek in Action YouTube video series for the Zeek network security monitoring project. Each video addresses a topic that I think might be of interest to people trying to understand their network using Zeek and adjacent tools and approaches, like Suricata, Wireshark, and so on. I am especially pleased with Video...
https://taosecurity.blogspot.com/2021/07/zeek-in-action-videos.html   
Published: 2021 07 29 18:34:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Criticism mounts over Czech implementation of EU cyber security - Euractiv - published about 2 months ago.
Content: The Czech Republic's implementation of the EU's NIS2 cybersecurity directive has been strongly criticised by mobile operators, who claim that the ...
https://www.euractiv.com/section/politics/news/criticism-mounts-over-czech-implementation-of-eu-cyber-security/   
Published: 2024 03 14 11:16:14
Received: 2024 03 14 12:42:18
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Criticism mounts over Czech implementation of EU cyber security - Euractiv - published about 2 months ago.
Content: The Czech Republic's implementation of the EU's NIS2 cybersecurity directive has been strongly criticised by mobile operators, who claim that the ...
https://www.euractiv.com/section/politics/news/criticism-mounts-over-czech-implementation-of-eu-cyber-security/   
Published: 2024 03 14 11:16:14
Received: 2024 03 14 12:42:18
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Proton Encrypted Mail Desktop App Now Available for Mac - published about 2 months ago.
Content:
https://www.macrumors.com/2024/03/14/proton-mail-desktop-app-available-mac/   
Published: 2024 03 14 12:09:29
Received: 2024 03 14 12:29:45
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Proton Encrypted Mail Desktop App Now Available for Mac - published about 2 months ago.
Content:
https://www.macrumors.com/2024/03/14/proton-mail-desktop-app-available-mac/   
Published: 2024 03 14 12:09:29
Received: 2024 03 14 12:29:45
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Research uncovers vulnerabilities in ChatGPT plugins - published about 2 months ago.
Content:
https://www.securitymagazine.com/articles/100511-research-uncovers-vulnerabilities-in-chatgpt-plugins   
Published: 2024 03 14 12:00:00
Received: 2024 03 14 12:05:20
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Research uncovers vulnerabilities in ChatGPT plugins - published about 2 months ago.
Content:
https://www.securitymagazine.com/articles/100511-research-uncovers-vulnerabilities-in-chatgpt-plugins   
Published: 2024 03 14 12:00:00
Received: 2024 03 14 12:05:20
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)

All Articles

Ordered by Date Received : Year: "2024" Month: "03" Day: "14" Hour: "12"
Page: 1 (of 0)

Total Articles in this collection: 19


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor