It was always difficult to separate fact from fiction when it came to breach information. Too many players had their own agendas to know what was real. Now there is another player in the room and it is FEAR, UNCERTAINTY AND DOUBT. Over the past four months alone, the press, social media accounts, and some […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A Presidential Executive Order (EO) is making its way though the approval process which, if approved, would require cloud vendors like Google and Amazon to identify who is buying server time from them. This is very similar to what banks and other financial institutions have been doing for decades. But Google’s and Amazon’s trade group […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
HHS Beefs up Privacy Protection for Reproductive Healthcare Info In a final rule released this week, doctors, clinics and other providers are prohibited from disclosing protected health information related to lawful reproductive healthcare. The rule is designed to protect women who cross state lines seeking an abortion and their providers. The 291 page regulation will […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Who would have guessed? Researchers at the University of Illinois Urbana-Champaign (UIUC) fed AI agents vague descriptions of more than a dozen unpatched vulnerabilities. The agent they created with GPT-4 exploited 87 percent of those vulnerabilities. Fourteen other agents made with lesser tools like GPT 3.5 and Metasploit failed. The researchers said that GPT-4 was […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Feds Give Another Chip Maker Subsidy to Build in US Last week the feds announced a subsidy to Taiwan Semi to build multiple chip plants (fabs) in Arizona. This week the feds announced, based on last year’s CHIPS Act, a subsidy to Samsung to build multiple plants in Texas. This creates a lot of construction […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There are folks who say that open source is safer than commercial software because, well, it is open source. Their theory is that since, technically, anyone can look at the source (ignoring the fact that you would need to be a trained programmer in whatever language that software is written in and have the time […]
Continue reading →
[DISPLAY_ACURAX_ICONS]