Filter by author:
Filter by tag:
Filter by title:
On-premises or in the cloud, security is your concern
We bring you a small comparison between on-premises and cloud environments, disclosing their advantages and disadvantages, with a stronger emphasis on security.
It's about time you relied on code-assisted pentesting
Here are some reasons why it would be prudent and beneficial to stop being reluctant to share your code for pentesting with a reputable cybersecurity company.
Our pick of the hardest challenges for ethical hackers
We share what to us are the 10 most challenging ethical hacking certifications, so that you can choose your next one and even trace a path to help your career.
Attackers can indirectly instruct AI for malicious aims
We show you that LLM-integrated apps can suffer indirect prompt injection attacks through different methods that can put the security of their users at risk.
Understanding 51 new PCI DSS requirements made easy
PCI DSS v4.0 brings 51 new requirements that are best practices until March 2025. We share a classification that may help take it all in.
Let's rather say a bunch of breaches in a single box
They said they discovered the mother of all data breaches. But it was a false alarm. Let's understand why.
NIST sheds light on the classification of attacks on AI
Here is an overview of a recent NIST report on adversarial machine learning that could help us understand more about attacks against and from AI systems.
Comply with the new requirements due for March 2024
Companies that store, handle or transfer account data must comply with PCI DSS v4.0 from March 31. We summarize its 13 new requirements to be met on that date.
Six main items in an AI policy for software development
Your company should have a policy about generative AI usage for software development. Read our suggestions on the most important items to include.