Everyone is in love with Large Language Model AIs, but they are far from perfect. Someone suggested that ChatGPT is “mansplaining as a service” (MaaS). While perhaps it is a somewhat pejorative term (to either the GPTs or men), it is fairly accurate. A couple of months ago a professor at UCLA asked ChatGPT to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Things are moving very quickly in the AI/Generative Pretrained Transformer (GPT) business. This is a super-competitive world between say Google, Microsoft, Meta, IBM and many others with – more to come. But there are still privacy laws to deal with and a court system that is ill-prepared to even fully understand the problem. There are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In an effort to fortify our critical infrastructure security, CISA has a new program to enhance cyber resilience of participating partners using CISA’s advanced threat detection and monitoring capabilities. The program is called CyberSentry and it is designed to work across industries, in real time and monitor both traditional IT networks and those control or […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Last week I wrote about how long it takes hackers to find “secrets” that are left accidentally (hopefully) exposed in the cloud. The answer was scarily short – as little as two minutes. This prompted one reader to ask “well how should I harden my cloud server”. Here are some tips. Most of the time […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Securities and Exchange Commission is not happy with JP Morgan for accidentally deleting millions of emails related to it’s Chase Bank subsidiary. The company deleted something on the order of 47 million electronic communications records from almost 9,000 mailboxes covering the period January 1 to April 23, 2018. Many of these records were required […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We hear stories about the time it takes to weaponize security patches. This test, by Orca Security, tested a different problem. They wanted to know how long it takes hackers to discover secrets that you leave exposed in your cloud environment. They tested a variety of resources from Github to AWS. The good news is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]