All Articles

Ordered by Date Received : Year: "2024" Month: "08" Day: "28" Hour: "15"
Page: 1 (of 0)

Total Articles in this collection: 25

Navigation Help at the bottom of the page
Article: CISA Adds One Known Exploited Vulnerability to Catalog - published 23 days ago.
Content:
https://www.cisa.gov/news-events/alerts/2024/08/28/cisa-adds-one-known-exploited-vulnerability-catalog   
Published: 2024 08 28 12:00:00
Received: 2024 08 28 15:42:52
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Article: CISA Adds One Known Exploited Vulnerability to Catalog - published 23 days ago.
Content:
https://www.cisa.gov/news-events/alerts/2024/08/28/cisa-adds-one-known-exploited-vulnerability-catalog   
Published: 2024 08 28 12:00:00
Received: 2024 08 28 15:42:52
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Article: Notorious Iranian Hackers Have Been Targeting the Space Industry With a New Backdoor - published 22 days ago.
Content:
https://www.wired.com/story/iran-peach-sandworm-tickler-backdoor/   
Published: 2024 08 28 15:19:42
Received: 2024 08 28 15:41:35
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Article: Notorious Iranian Hackers Have Been Targeting the Space Industry With a New Backdoor - published 22 days ago.
Content:
https://www.wired.com/story/iran-peach-sandworm-tickler-backdoor/   
Published: 2024 08 28 15:19:42
Received: 2024 08 28 15:41:35
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Cybersecurity Act 2024: Nacsa Revamps NCII Listings - The Cyber Express - published 23 days ago.
Content: Nacsa will update its NCII list under the Cybersecurity Act 2024, enhancing national cybersecurity with new regulations on incident reporting, ...
https://thecyberexpress.com/nacsa-revamps-cybersecurity-act-2024/   
Published: 2024 08 28 11:49:50
Received: 2024 08 28 15:41:31
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity Act 2024: Nacsa Revamps NCII Listings - The Cyber Express - published 23 days ago.
Content: Nacsa will update its NCII list under the Cybersecurity Act 2024, enhancing national cybersecurity with new regulations on incident reporting, ...
https://thecyberexpress.com/nacsa-revamps-cybersecurity-act-2024/   
Published: 2024 08 28 11:49:50
Received: 2024 08 28 15:41:31
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: How AI is changing the cybersecurity landscape - Yahoo Finance - published 23 days ago.
Content: ... cybersecurity industry. "We have begun to see a little bit of an impact as it relates to cybersecurity stocks, specifically in the security ...
https://finance.yahoo.com/video/ai-changing-cybersecurity-landscape-120043819.html   
Published: 2024 08 28 12:21:08
Received: 2024 08 28 15:41:31
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: How AI is changing the cybersecurity landscape - Yahoo Finance - published 23 days ago.
Content: ... cybersecurity industry. "We have begun to see a little bit of an impact as it relates to cybersecurity stocks, specifically in the security ...
https://finance.yahoo.com/video/ai-changing-cybersecurity-landscape-120043819.html   
Published: 2024 08 28 12:21:08
Received: 2024 08 28 15:41:31
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: All-in-One: How Cynet is Revolutionizing Cybersecurity for MSPs - Silicon UK - published 23 days ago.
Content: By unifying a full suite of cybersecurity capabilities in a simple, cost-effective solution, Cynet enables MSPs to provide a full breach protection ...
https://www.silicon.co.uk/press-release/all-in-one-how-cynet-is-revolutionizing-cybersecurity-for-msps   
Published: 2024 08 28 12:21:47
Received: 2024 08 28 15:41:31
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: All-in-One: How Cynet is Revolutionizing Cybersecurity for MSPs - Silicon UK - published 23 days ago.
Content: By unifying a full suite of cybersecurity capabilities in a simple, cost-effective solution, Cynet enables MSPs to provide a full breach protection ...
https://www.silicon.co.uk/press-release/all-in-one-how-cynet-is-revolutionizing-cybersecurity-for-msps   
Published: 2024 08 28 12:21:47
Received: 2024 08 28 15:41:31
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations | CISA - published 23 days ago.
Content: ... Cybersecurity Advisory (CSA) to warn network defenders that, as of August 2024, a group of Iran-based cyber actors continues to exploit U.S. and ...
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a   
Published: 2024 08 28 13:47:53
Received: 2024 08 28 15:41:31
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations | CISA - published 23 days ago.
Content: ... Cybersecurity Advisory (CSA) to warn network defenders that, as of August 2024, a group of Iran-based cyber actors continues to exploit U.S. and ...
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a   
Published: 2024 08 28 13:47:53
Received: 2024 08 28 15:41:31
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Genians to Lead $3M Cybersecurity Project to Strengthen Middle Eastern Market - published 23 days ago.
Content: Additionally, UAE-based cybersecurity firm RAS Infotech will collaborate on the project, with large government, healthcare, and financial institutions ...
https://www.silicon.co.uk/press-release/genians-to-lead-3m-cybersecurity-project-to-strengthen-middle-eastern-market   
Published: 2024 08 28 14:17:18
Received: 2024 08 28 15:41:31
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Genians to Lead $3M Cybersecurity Project to Strengthen Middle Eastern Market - published 23 days ago.
Content: Additionally, UAE-based cybersecurity firm RAS Infotech will collaborate on the project, with large government, healthcare, and financial institutions ...
https://www.silicon.co.uk/press-release/genians-to-lead-3m-cybersecurity-project-to-strengthen-middle-eastern-market   
Published: 2024 08 28 14:17:18
Received: 2024 08 28 15:41:31
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Seeking a Job in Cybersecurity? Protect Yourself From Scams - BankInfoSecurity - published 22 days ago.
Content: Cybersecurity is a rapidly growing field. Organizations worldwide are seeking skilled professionals to safeguard their digital assets. This high ...
https://www.bankinfosecurity.com/blogs/seeking-job-in-cybersecurity-protect-yourself-from-scams-p-3697   
Published: 2024 08 28 15:21:24
Received: 2024 08 28 15:41:31
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Seeking a Job in Cybersecurity? Protect Yourself From Scams - BankInfoSecurity - published 22 days ago.
Content: Cybersecurity is a rapidly growing field. Organizations worldwide are seeking skilled professionals to safeguard their digital assets. This high ...
https://www.bankinfosecurity.com/blogs/seeking-job-in-cybersecurity-protect-yourself-from-scams-p-3697   
Published: 2024 08 28 15:21:24
Received: 2024 08 28 15:41:31
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Telecom security panel launches post-quantum cryptography study to support transition efforts - published 23 days ago.
Content: The National Security Telecommunications Advisory Committee is taking on a new project to provide guidance on efforts to support the transition to ...
https://insidecybersecurity.com/daily-news/telecom-security-panel-launches-post-quantum-cryptography-study-support-transition   
Published: 2024 08 28 10:07:26
Received: 2024 08 28 15:21:24
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Telecom security panel launches post-quantum cryptography study to support transition efforts - published 23 days ago.
Content: The National Security Telecommunications Advisory Committee is taking on a new project to provide guidance on efforts to support the transition to ...
https://insidecybersecurity.com/daily-news/telecom-security-panel-launches-post-quantum-cryptography-study-support-transition   
Published: 2024 08 28 10:07:26
Received: 2024 08 28 15:21:24
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Federal Office for Securing the Constitution and Bitkom want more cyber security - Heise - published 23 days ago.
Content: This article was originally published in German and has been automatically translated. The perception of the cyber security situation among companies ...
https://www.heise.de/en/news/Federal-Office-for-Securing-the-Constitution-and-Bitkom-want-more-cyber-security-9850253.html   
Published: 2024 08 28 12:26:38
Received: 2024 08 28 15:21:24
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Federal Office for Securing the Constitution and Bitkom want more cyber security - Heise - published 23 days ago.
Content: This article was originally published in German and has been automatically translated. The perception of the cyber security situation among companies ...
https://www.heise.de/en/news/Federal-Office-for-Securing-the-Constitution-and-Bitkom-want-more-cyber-security-9850253.html   
Published: 2024 08 28 12:26:38
Received: 2024 08 28 15:21:24
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: £100,000 help cyber business expand apprenticeship scheme - South West - published 23 days ago.
Content: Cornish cyber security business Cool Waters Cyber has received £100,000 to help expand its apprenticeship scheme. The Tremough Innovation Centre ...
https://www.thebusinessdesk.com/south-west/news/15858-100000-help-cyber-business-expand-apprenticeship-scheme   
Published: 2024 08 28 13:50:10
Received: 2024 08 28 15:21:23
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: £100,000 help cyber business expand apprenticeship scheme - South West - published 23 days ago.
Content: Cornish cyber security business Cool Waters Cyber has received £100,000 to help expand its apprenticeship scheme. The Tremough Innovation Centre ...
https://www.thebusinessdesk.com/south-west/news/15858-100000-help-cyber-business-expand-apprenticeship-scheme   
Published: 2024 08 28 13:50:10
Received: 2024 08 28 15:21:23
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Verizon Unveils Mobile Security Index to Guide Professionals in Fortifying Mobile Defences - published 23 days ago.
Content: Cyber Security. Verizon Examines Mobile Defences amid Growing Business Use. By Kristian McCann. August 28, 2024. 4 mins. Cybercriminals, who see the ...
https://cybermagazine.com/articles/verizons-security-report-explores-mobile-defence   
Published: 2024 08 28 14:25:11
Received: 2024 08 28 15:21:23
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Verizon Unveils Mobile Security Index to Guide Professionals in Fortifying Mobile Defences - published 23 days ago.
Content: Cyber Security. Verizon Examines Mobile Defences amid Growing Business Use. By Kristian McCann. August 28, 2024. 4 mins. Cybercriminals, who see the ...
https://cybermagazine.com/articles/verizons-security-report-explores-mobile-defence   
Published: 2024 08 28 14:25:11
Received: 2024 08 28 15:21:23
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Global cyber spend to rise 15% in 2025, pushed along by AI | Computer Weekly - published 22 days ago.
Content: Worldwide end-user cyber security spending is predicted to grow by just over 15% year-on-year over the course of 2025, hitting a new high of ...
https://www.computerweekly.com/news/366609115/Global-cyber-spend-to-rise-15-in-2025-pushed-along-by-AI   
Published: 2024 08 28 14:49:06
Received: 2024 08 28 15:21:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Global cyber spend to rise 15% in 2025, pushed along by AI | Computer Weekly - published 22 days ago.
Content: Worldwide end-user cyber security spending is predicted to grow by just over 15% year-on-year over the course of 2025, hitting a new high of ...
https://www.computerweekly.com/news/366609115/Global-cyber-spend-to-rise-15-in-2025-pushed-along-by-AI   
Published: 2024 08 28 14:49:06
Received: 2024 08 28 15:21:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Toyota Confirms Third-Party Data Breach After Sensitive Info Leaks on the Dark Web - published 22 days ago.
Content: Alicia Hope has been a journalist for more than 5 years, reporting on technology, cyber security and data privacy news. Related.
https://www.cpomagazine.com/cyber-security/toyota-confirms-third-party-data-breach-after-sensitive-info-leaks-on-the-dark-web/   
Published: 2024 08 28 15:09:37
Received: 2024 08 28 15:21:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Toyota Confirms Third-Party Data Breach After Sensitive Info Leaks on the Dark Web - published 22 days ago.
Content: Alicia Hope has been a journalist for more than 5 years, reporting on technology, cyber security and data privacy news. Related.
https://www.cpomagazine.com/cyber-security/toyota-confirms-third-party-data-breach-after-sensitive-info-leaks-on-the-dark-web/   
Published: 2024 08 28 15:09:37
Received: 2024 08 28 15:21:22
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: iPhone 15 Pro Max vs. Google's New Pixel 9 Pro XL - published 22 days ago.
Content:
https://www.macrumors.com/2024/08/28/iphone-15-pro-max-vs-pixel-9-pro-xl/   
Published: 2024 08 28 15:00:19
Received: 2024 08 28 15:19:49
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: iPhone 15 Pro Max vs. Google's New Pixel 9 Pro XL - published 22 days ago.
Content:
https://www.macrumors.com/2024/08/28/iphone-15-pro-max-vs-pixel-9-pro-xl/   
Published: 2024 08 28 15:00:19
Received: 2024 08 28 15:19:49
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Rezonate’s mid-market solution reduces the cloud identity attack surface - published 23 days ago.
Content:
https://www.helpnetsecurity.com/2024/08/28/rezonate-mid-market-solution/   
Published: 2024 08 28 13:30:31
Received: 2024 08 28 15:16:43
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Rezonate’s mid-market solution reduces the cloud identity attack surface - published 23 days ago.
Content:
https://www.helpnetsecurity.com/2024/08/28/rezonate-mid-market-solution/   
Published: 2024 08 28 13:30:31
Received: 2024 08 28 15:16:43
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Diligent NIS2 Compliance Toolkit helps organizations bolster their cybersecurity resilience - published 23 days ago.
Content:
https://www.helpnetsecurity.com/2024/08/28/diligent-nis2-compliance-toolkit/   
Published: 2024 08 28 14:00:15
Received: 2024 08 28 15:16:43
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Diligent NIS2 Compliance Toolkit helps organizations bolster their cybersecurity resilience - published 23 days ago.
Content:
https://www.helpnetsecurity.com/2024/08/28/diligent-nis2-compliance-toolkit/   
Published: 2024 08 28 14:00:15
Received: 2024 08 28 15:16:43
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: AuthenticID enhances Smart ReAuth to combat AI-based attacks and account takeovers - published 23 days ago.
Content:
https://www.helpnetsecurity.com/2024/08/28/authenticid-smart-reauth/   
Published: 2024 08 28 14:30:21
Received: 2024 08 28 15:16:43
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: AuthenticID enhances Smart ReAuth to combat AI-based attacks and account takeovers - published 23 days ago.
Content:
https://www.helpnetsecurity.com/2024/08/28/authenticid-smart-reauth/   
Published: 2024 08 28 14:30:21
Received: 2024 08 28 15:16:43
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Veeam Data Platform 12.2 extends data resilience to more platforms and applications - published 22 days ago.
Content:
https://www.helpnetsecurity.com/2024/08/28/veeam-data-platform-12-2/   
Published: 2024 08 28 15:00:15
Received: 2024 08 28 15:16:43
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Veeam Data Platform 12.2 extends data resilience to more platforms and applications - published 22 days ago.
Content:
https://www.helpnetsecurity.com/2024/08/28/veeam-data-platform-12-2/   
Published: 2024 08 28 15:00:15
Received: 2024 08 28 15:16:43
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published over 3 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of. Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/   
Published: 2021 02 08 16:25:58
Received: 2024 08 28 15:16:37
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published over 3 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of. Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/   
Published: 2021 02 08 16:25:58
Received: 2024 08 28 15:16:37
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Asset Management – Back To The Roots - published over 3 years ago.
Content: Asset management is one of the core components of many successful security programs. I am an advisor to Panaseer, a startup in the continuous compliance management space. I recently co-authored a blog post on my favorite security metric that is related to asset management: How many assets are in the environment? A simple number. A number that tells a c...
https://raffy.ch/blog/2021/03/31/asset-management-back-to-the-roots/   
Published: 2021 03 31 13:47:25
Received: 2024 08 28 15:16:37
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Asset Management – Back To The Roots - published over 3 years ago.
Content: Asset management is one of the core components of many successful security programs. I am an advisor to Panaseer, a startup in the continuous compliance management space. I recently co-authored a blog post on my favorite security metric that is related to asset management: How many assets are in the environment? A simple number. A number that tells a c...
https://raffy.ch/blog/2021/03/31/asset-management-back-to-the-roots/   
Published: 2021 03 31 13:47:25
Received: 2024 08 28 15:16:37
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: A Security Product Reference Model - published over 3 years ago.
Content: On a recent consulting engagement with Cynergy Partners, we needed to decipher the security product market to an investment firm that normally doesn’t invest in cyber security. One of the investor’s concerns was that a lot of cyber companies are short-lived businesses due to the threats changing so drastically quick. One day it’s ransomware X, the next day i...
https://raffy.ch/blog/2021/04/16/a-security-product-reference-model/   
Published: 2021 04 16 21:30:24
Received: 2024 08 28 15:16:37
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: A Security Product Reference Model - published over 3 years ago.
Content: On a recent consulting engagement with Cynergy Partners, we needed to decipher the security product market to an investment firm that normally doesn’t invest in cyber security. One of the investor’s concerns was that a lot of cyber companies are short-lived businesses due to the threats changing so drastically quick. One day it’s ransomware X, the next day i...
https://raffy.ch/blog/2021/04/16/a-security-product-reference-model/   
Published: 2021 04 16 21:30:24
Received: 2024 08 28 15:16:37
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published over 3 years ago.
Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti...
https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/   
Published: 2021 05 19 22:04:11
Received: 2024 08 28 15:16:37
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published over 3 years ago.
Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti...
https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/   
Published: 2021 05 19 22:04:11
Received: 2024 08 28 15:16:37
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: A Logging History Lesson – From syslogd(8) to XDR - published over 3 years ago.
Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal...
https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/   
Published: 2021 06 08 16:05:55
Received: 2024 08 28 15:16:37
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: A Logging History Lesson – From syslogd(8) to XDR - published over 3 years ago.
Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal...
https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/   
Published: 2021 06 08 16:05:55
Received: 2024 08 28 15:16:37
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Leadership | Technology | Spirit - published 23 days ago.
Content: Who knows, I might just pick up my blogging again at some point. For now, I posted a short leadership related post on my Leadership | Technology | Spirit blog. Check it out. The post Leadership | Technology | Spirit first appeared on Cyber Security - Strategy and Innovation....
https://raffy.ch/blog/2024/08/28/leadership-technology-spirit/   
Published: 2024 08 28 13:41:45
Received: 2024 08 28 15:16:37
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Leadership | Technology | Spirit - published 23 days ago.
Content: Who knows, I might just pick up my blogging again at some point. For now, I posted a short leadership related post on my Leadership | Technology | Spirit blog. Check it out. The post Leadership | Technology | Spirit first appeared on Cyber Security - Strategy and Innovation....
https://raffy.ch/blog/2024/08/28/leadership-technology-spirit/   
Published: 2024 08 28 13:41:45
Received: 2024 08 28 15:16:37
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security

All Articles

Ordered by Date Received : Year: "2024" Month: "08" Day: "28" Hour: "15"
Page: 1 (of 0)

Total Articles in this collection: 25


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor