The law firm Baker Hostetler published its 2023 Data Security Incident Response Report. It is based on more than 1,100 cybersecurity incidents investigated by them last year. Here are some of the statistics they published: The most common actions after initial access were: While a blockchain data analysis company said that the total amount of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Most people know about OpenAI’s ChatGPT, funded, in part, by a massive infusion of cash from Microsoft. People also are aware of the privacy concerns of GPT-type tools. In many cases, the damage is not intentional, but accidental. People submitting sensitive queries without thinking about it. Also, as more and more software incorporates GPT-tools under […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While some people go out of their way to talk about other – non-friendly – countries conducting information warfare ops, it is useful to understand that everyone does it and that includes us. Just one example. The U.S. has many of these examples. The U.S. Army Cyber Command told defense contractors it planned to surveil […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to the Electronic Frontier Foundation, The DSA overhauls the EU’s core platform regulation, the e-Commerce Directive, and is intended to be an important tool in making the internet a fairer place by setting out new legal responsibilities for online platforms and educating users on why content is removed and what they can do about it. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As U.S. states implement new second-generation privacy laws (there are currently 8 states – can you name all of them?), the rules regarding data retention are changing and you might want to be prepared – unless, of course, you enjoy spending tens of thousands of dollars on lawyers to defend yourself, hours being deposed and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
No sane person can deny the allure of Generative Pre-trained Transformer AIs. Smart people are also concerned about the security risks they create. For example, if you use an AI to write code, could the AI include a back door? Or malware? How do you know without reviewing every line of code in detail? In […]
Continue reading →
[DISPLAY_ACURAX_ICONS]