As I discussed in an earlier blog post, AI technologies show promise for improving productivity, but they can also be utilized by bad actors. A frequently-cited example is the story of a couple who were scammed by a criminal using voice-cloning technology to...
There is a common misconception that cyber criminals only go after large organizations, but smaller companies have become attractive targets. According to the US Cybersecurity and Infrastructure Security Agency (CISA), small businesses are three times more likely to...
In the ever-evolving landscape of cybersecurity, security-minded organizations look for the most effective methods to protect their systems and data from cyberthreats. Penetration testing, meaning an authorized, simulated penetration of a computer system, is a crucial...
The transition of US government agencies to the cloud is an exciting opportunity for Cloud Service Providers (CSPs). Yet before CSPs can take advantage of that opportunity, they must be authorized via the Federal Risk and Authorization Management Program (FedRAMP)....
The Microsoft 365 suite of tools provides productivity benefits to many organizations. However, the default settings of Microsoft 365 when implemented out of the box may not be secure enough for your organization. This can leave your organization vulnerable to...
AI tools are being deployed by IT departments around the world, and many organizations are reaping immediate benefits. However, there are many myths and misconceptions surrounding AI, and believing them can lead to security risks. Here are four common AI myths and the...
Recent Comments