CISO News Headlines
The Register Headlines
Hacker News Headlines
SecurityWeek Headlines
- RSS Error: A feed could not be found at `https://www.securityweek.com/feed/`; the status code is `403` and content-type is `text/html; charset=UTF-8`
TechRepublic Headlines
Canadian CyberSecurity Journal Headlines
Enterprise AI Headlines
Search Cyberinsight.ca
-
Today is Saturday
2023/12/02 - You are visiting from - 3.238.180.174
-
Author Archives: Editor
What is this revolutionary Q* AI discovery: The Discovery That Threatens Humanity
Q* (pronounced Q-Star) is the latest buzzword in artificial intelligence circles. It appears that it might have been behind the motivation for OpenAI’s CEO firing. The problem is this: nobody knows exactly what Q* is about, other than it’s the … Continue reading
Posted in Articles
Tagged Synthetic Data, The Discovery That Threatens Humanity, What is the revolutionary Q* (Q-Start) AI discover about
Comments Off on What is this revolutionary Q* AI discovery: The Discovery That Threatens Humanity
Password length 101
You probably heard someone tell you to change your password. Well, in this article, I will try to demystify the world of passwords. This should give you a better appreciation about changing password length to subdue potential breach of your … Continue reading
How important is a SIEM to Cybersecurity
“Upmost importance” would describe a SIEM within an organization. Let’s do a high level view of what a SIEM is. “Security Information & Event Management” and its acronym is SIEM. Most SIEM come in form of software which is installed … Continue reading
Posted in Articles, Firewalls
Tagged Cybersecurity, important, SIEM
Comments Off on How important is a SIEM to Cybersecurity
Still Don’t Understand Zero-Trust? Watch this!
I have observed that many individuals, including cyber-security professionals, often fail to fully comprehend the essence of “Zero-Trust.” They mistakenly perceive it as a technology or a product, when in reality, it is a comprehensive approach, a mindset, and a … Continue reading
Posted in A.I., Articles
Tagged China, Chinese government, espionage, Example, Zero-Trust
Comments Off on Still Don’t Understand Zero-Trust? Watch this!
Bing Chat and ChatGPT can’t handle basic logic
Bing Chat To see if Bing Chat was able to handle logic problem, I submitted a question to Microsoft’s Bing Chat and received a strange answer. Here’s the question to Bing Chat. Question: If you line-up 3 wet towels on … Continue reading
Posted in Articles
Tagged Bing Chat Behaving Badly - Computerphile, ChatGPT can't handle basic logic
Comments Off on Bing Chat and ChatGPT can’t handle basic logic
Formula used by phone scammers
The formula: “Phonecall + Asking for Money = Scam” is generally true. Many scams involve a caller who makes unsolicited calls or sends unsolicited messages, and then asks the recipient to send money or provide personal information. Common types of … Continue reading
What’s a Password-Less Environment
A password-less environment refers to a system or platform that eliminates the need for traditional passwords as a means of authentication. In this type of environment, users are authenticated through alternative methods such as biometrics, security keys, or one-time codes … Continue reading
Posted in Articles, ChatGPT
Tagged Environment, Password-Less
Comments Off on What’s a Password-Less Environment
CrytoCurrency explained – rubber hose crytanalysis
I don’t have much comments in this article simply because I think the youtuber Josh Madakor does a smashing job explaining how CrytoCurrency works and why it’s not ready for the mainstream. I fully stand behind his analysis, specially the … Continue reading
Posted in Articles, Crypto
Tagged crytanalysis, CrytoCurrency, explained, hose, rubber
Comments Off on CrytoCurrency explained – rubber hose crytanalysis
Better than Zero-Trust ?
You read this correctly, amputate that source IP at your firewall network connections and dramatically increase your survival of a CyberAttacks, and this, at a fraction of the cost of zero-trust framework. As a professional IT person with +30 years … Continue reading
Protect your Fortigate with LOCAL-IN policies
One of the biggest mistake made while deploying a Fortigate firewall is focussing strictly on its policies between zones or interfaces. Little do people know, LOCAL-IN policies also need configuration to protect the firewall from exposing remote access to it’s … Continue reading
Eradicating phishing attacks using multiple email servers
Do you remember when email servers were very efficient, dramatically increased companies internal communications and we absolutely not susceptible to any kind of phishing attacks, spams or viruses? I do! Thirty years ago, that’s how it was and learning from … Continue reading
AI and the God question
As I was scrolling thru the internet to watch more obscure movies (Yeah, I’m a movie junky), I stumbled on this little gem which explorers the question of the existence of “a God” using an advanced artificial intelligence computer which … Continue reading
The powers of updating
Patch Management If there is one thing, a single thing, you can do to greatly improve your chances of fending off cyberattacks, it’s adopting a good digital hygiene strategy. In other words, adopting and implementing a comprehensive best practice methodology … Continue reading
Machine learning and cheating
Machine learning is a process that gives the ability to predict outcomes using past events. During my career, I realized that I was getting very good at predicting the probability of outcomes and/or root cause of issues. My boss always … Continue reading
From Laces to AI – The Connection
While researching the ups and downs of AI (Artifician Intelligence), I stumbled on this cool youtube video which makes the connections between 17th century automated lace making, creativity and AI. If you are old enough to remember the excellent “Connections” … Continue reading
Posted in A.I., Articles
Tagged AI, Connection, Laces
Comments Off on From Laces to AI – The Connection
Telephone scams are more targetted- August 2022
As of August 2022, we have spotted a new telephone scam variant which seems to be slightly more targeted and made to look a little more legitimate, but is still easily detectable. The scam will sounds like… – You will … Continue reading
CMMC 2.0
Cybersecurity Maturity Model Certification Department of Defense (DoD) Contractor community is now required to build and maintain a proper cybersecurity posture to help protect the US from its adversaries. The official CMMC rollout will occur over several years to encompass … Continue reading
NIST CyberSecurity Framework
Here is a useful NIST.GOV’s CyberSecurity Framework grid to help you memorise your cyber security strategy. NIST’s website: https://www.nist.gov/cyberframework
Posted in Articles, Documents
Tagged Cybersecurity, Framework, NIST
Comments Off on NIST CyberSecurity Framework
Security Certification Roadmap
Paul Jerimy compiled a cool map of all security certifications. With bookmarking this website! Security Certification Roadmap
Posted in Articles, Documents
Tagged Certification, Roadmap, Security
Comments Off on Security Certification Roadmap