Search Cyberinsight.ca
CISO News Headlines
The Register Headlines
Hacker News Headlines
TechRepublic Headlines
- RSS Error: A feed could not be found at `https://www.techrepublic.com/rssfeeds/topic/security/`; the status code is `403` and content-type is `text/html; charset=UTF-8`
CyberCrime Mag
Enterprise AI Headlines
-
Today is Wednesday
2025/04/30 - You are visiting from - 18.118.253.134
-
Category Archives: Articles
Protect your Fortigate with LOCAL-IN policies
One of the biggest mistake made while deploying a Fortigate firewall is focussing strictly on its policies between zones or interfaces. Little do people know, LOCAL-IN policies also need configuration to protect the firewall from exposing remote access to it’s … Continue reading
Eradicating phishing attacks using multiple email servers
Do you remember when email servers were very efficient, dramatically increased companies internal communications and we absolutely not susceptible to any kind of phishing attacks, spams or viruses? I do! Thirty years ago, that’s how it was and learning from … Continue reading
AI and the God question
As I was scrolling thru the internet to watch more obscure movies (Yeah, I’m a movie junky), I stumbled on this little gem which explorers the question of the existence of “a God” using an advanced artificial intelligence computer which … Continue reading
The powers of updating
Patch Management If there is one thing, a single thing, you can do to greatly improve your chances of fending off cyberattacks, it’s adopting a good digital hygiene strategy. In other words, adopting and implementing a comprehensive best practice methodology … Continue reading
Machine learning and cheating
Machine learning is a process that gives the ability to predict outcomes using past events. During my career, I realized that I was getting very good at predicting the probability of outcomes and/or root cause of issues. My boss always … Continue reading
From Laces to AI – The Connection
While researching the ups and downs of AI (Artifician Intelligence), I stumbled on this cool youtube video which makes the connections between 17th century automated lace making, creativity and AI. If you are old enough to remember the excellent “Connections” … Continue reading
Posted in A.I., Articles
Tagged AI, Connection, Laces
Comments Off on From Laces to AI – The Connection
CMMC 2.0
Cybersecurity Maturity Model Certification Department of Defense (DoD) Contractor community is now required to build and maintain a proper cybersecurity posture to help protect the US from its adversaries. The official CMMC rollout will occur over several years to encompass … Continue reading
NIST CyberSecurity Framework
Here is a useful NIST.GOV’s CyberSecurity Framework grid to help you memorise your cyber security strategy. NIST’s website: https://www.nist.gov/cyberframework
Posted in Articles, Documents
Tagged Cybersecurity, Framework, NIST
Comments Off on NIST CyberSecurity Framework
Security Certification Roadmap
Paul Jerimy compiled a cool map of all security certifications. With bookmarking this website! Security Certification Roadmap
Posted in Articles, Documents
Tagged Certification, Roadmap, Security
Comments Off on Security Certification Roadmap
CISSP Cheat Sheets Domain 1-8
Comparitech compiled Cheat Sheets for CISSP exams. They are quite useful to help you review CISSP domains, memorize terminologies and acronyms. Below are links to each sheets. Domain 1: Security and Risk Management Domain 2: Asset Security Domain 3: Security … Continue reading
Posted in Articles, Documents
Tagged Cheat Sheets, CISSP, Domain
Comments Off on CISSP Cheat Sheets Domain 1-8
Disposable Email Addresses
Circa 1993, I registered my first .COM and .NET domain for the small company I worked for and got a couple unix shell accounts to access it. The Internet of the early 90’s was amazing, had no publicity, no search … Continue reading
Posted in Articles, Servers
Tagged Disposable Email Addresses
Comments Off on Disposable Email Addresses
Forti-Savings : How to manage Fortigates
Soon after adopting and purchasing Fortinet fortigates firewalls of various sizes and performance, I calculated that after a few years of ownership, and IF you maintained the Support/Subscription on the devices, you can dramatically reduce your cost of ownership by … Continue reading
Posted in Articles, Firewalls
Tagged Forti-Savings
Comments Off on Forti-Savings : How to manage Fortigates
The ideal SMTP Server
For many years, I managed email servers for various companies. One of my first challenge was to configure anti-spam filters to block a maximum amount of spams, while allowing legitimate emails. That wasn’t easy as spammers changed their strategies monthly. … Continue reading
About ChatGPT
ChatGPT is an AI-powered language model developed by OpenAI. It’s capable of generating human-like text based on the input it receives. It’s trained on a large corpus of text data, which enables it to generate a wide variety of responses … Continue reading
AI player map
AI Services wheel. Here is a map of all the players in the AI field.
What is COBIT
COBIT (Control Objectives for Information and Related Technologies) is a framework for the governance and management of enterprise IT (Information Technology). It was first developed by ISACA (Information Systems Audit and Control Association) in 1996, and has since been updated … Continue reading