Whalers Blog

  • Blog
  • About
  • Admin
  • Categories
  • Contact
    • X
    • Telegram
    • Mastodon
    • Bluesky
  • February 6, 2025

    On Generative AI Security

    Microsoft’s AI Red Team just published “Lessons from Red Teaming 100 Generative AI Products.” Their blog post lists “three takeaways,” but the eight lessons in the report itself are more useful: Understand what the system can do and where it is applied. You don’t have to compute gradients to break an AI system. AI red…

    AI, computer security, cyberattack, Cybersecurity, Cybersecurity awareness, LLM, Microsoft, Security, Security Awareness, Uncategorized, Vulnerabilities
  • February 6, 2025

    Deepfakes and the 2024 US Election

    Interesting analysis: We analyzed every instance of AI use in elections collected by the WIRED AI Elections Project (source for our analysis), which tracked known uses of AI for creating political content during elections taking place in 2024 worldwide. In each case, we identified what AI was used for and estimated the cost of creating…

    AI, Cybersecurity, Cybersecurity awareness, deception, Deepfake, Security, Security Awareness, Uncategorized, Vulnerabilities
  • February 6, 2025

    Journalists and Civil Society Members Using WhatsApp Targeted by Paragon Spyware

    This is yet another story of commercial spyware being used against journalists and civil society members. The journalists and other civil society members were being alerted of a possible breach of their devices, with WhatsApp telling the Guardian it had “high confidence” that the 90 users in question had been targeted and “possibly compromised.” It…

    Cybersecurity, Cybersecurity awareness, Security, Security Awareness, spyware, Uncategorized, Vulnerabilities, WhatsApp
  • February 6, 2025

    LevelBlue Expands Its Partner Program Globally

    Businesses worldwide are challenged with increasingly sophisticated cyber threats, and the need for advanced security solutions has never been greater. That’s why we’re expanding the LevelBlue Partner Program through strategic alliances to add to our strong global base of managed service providers (MSPs) managed security service providers (MSSPs) and resellers in different regions including Europe…

    Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Vulnerabilities
  • February 6, 2025

    New LevelBlue Threat Trends Report gives Critical Insights into Threats

    LevelBlue is pleased to announce the launch of the LevelBlue Threat Trends Report! This biannual report, which is a collaboration between various LevelBlue Security Operations teams, is a must-have for security practitioners at organizations of all sizes. It provides relevant, actionable information about ongoing threats as well as guidance on how organizations can work to…

    Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Vulnerabilities
  • February 6, 2025

    What Is Zero Trust?

    Zero Trust Security Model Definition With the adoption of cloud computing, mobile devices, and the Internet of Things (IoT), the traditional network perimeter no longer exists. This has created challenges for security professionals, requiring a new approach to cybersecurity. Zero Trust has emerged as a transformative security model. Let’s take a closer look into what…

    Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Vulnerabilities
  • February 6, 2025

    Passkeys: The future of secure and seamless authentication

    What are passkeys? You may have seen the term “passkeys” appearing more frequently in tech news, app updates, and security discussions. Major companies like Apple, Google, and Microsoft are rolling out passkeys as a replacement for passwords, promising both enhanced security and a smoother user experience. But what exactly are passkeys, and why are they…

    Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Threat Lab, Vulnerabilities
  • February 6, 2025

    OpenText Secure Cloud: Streamline workflows with integrations

    Simplifying security management is an important step toward better protection without sacrificing operational efficiency. With the added capability of automating processes by integrating with popular tools, security management can also deliver streamlined workflows. OpenText Secure Cloud provides billing reconciliation by integrating with popular tools such as HaloPSA, ConnectWise PSA, AutoTask, and Kaseya BMS so you…

    Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Threat Lab, Vulnerabilities
  • February 6, 2025

    MDR for MSPs: Navigating EDR compatibility

    When it comes to endpoint detection and response (EDR) compatibility within an MDR offering, managed service providers (MSPs) are weighing two key priorities: native EDR integration or the flexibility to support multiple solutions. According to a recent OpenText survey, opinions are split almost evenly. While 52% of MSPs view native compatibility as moderately or very…

    Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Threat Lab, Vulnerabilities
  • February 6, 2025

    Shifting Perception: QA Beyond Testing

      Author: Yaroslava Mazepina, NSTC 2024 Speaker Please note: We are accepting speaker applications for #NSTC2025. Apply here. The fear that AI will replace jobs is widespread, and QA engineering is no exception. AI-driven tools are now capable of automating tests, detecting patterns, and even predicting defects. However, the real question is: Can AI replace…

    Cloud, CloudNative, Development, DevOps, Expert POV
    #nstc2025
Previous Page
1 … 60 61 62 63 64 … 95
Next Page

Designed by Alireza Gharib