Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing medical devices: The role of fuzz testing in cybersecurity

In today's digital and interconnected era, the healthcare sector operates in a landscape of security risks. In 2023 alone, the number of vulnerabilities uncovered in medical devices jumped by 59% to 993 issues. Consequently, the U.S. Food and Drug Administration (FDA), the European Commission, and other governmental agencies have issued cybersecurity guidelines for medical devices. Many of these guidelines advocate for fuzz testing as a means of vulnerability detection.

Internet disruptions from cable failures in Africa to technical issues (and an RSA teaser)

"This Week in NET". Episode #59 Host João Tomé (based in Lisbon, Portugal) is joined by our Head of Data Insights, David Belson, based in Boston. We discuss our recent Q1 2024 Internet disruption summary blog post. There were submarine cable failures that impacted 13 countries in Africa. We also address technical issues with RPKI, DNS, and DNSSEC that disrupted connectivity for subscribers across multiple network providers.

Unlocking the Future: Brivo's AI-Driven Security Solutions

Dive into the world of AI-driven security with Brivo! In this video, we explore how Brivo is at the forefront of the AI evolution, tailoring cutting-edge security solutions to meet customer needs. 🛡️🔐 Discover how staying updated with AI trends like generative AI, machine learning, and cyber security enables Brivo to innovate and respond to feedback effectively. From IBM's cloud technology to the future of AI in security, learn how artificial intelligence is transforming the way we protect our spaces. 🤖🌐

Insider Security Risks: A Pen Testing Reality Check for Large Companies | Razorthorn Security

Amy Stokes-Waters shares a startling anecdote from her pen testing sales experience in this must-watch clip. Learn how a company with 3,000 employees misunderstood the real risks of insider threats. Amy highlights the common oversight where businesses assume 'nice' means 'safe,' exposing them to potential cyberattacks. This video underscores the critical need for rigorous network security and vigilant monitoring of internal threats.

Retrieval Augmented Generation (RAG): Unlocking the Power of Hybrid AI Models

Language models have revolutionized natural language processing, enabling machines to generate human-like text with remarkable fluency and coherence. However, despite their impressive capabilities, traditional language models often need help with knowledge-intensive tasks that require factual accuracy, external knowledge integration, and contextual awareness.

Protecting Your Digital Footprint: The Dangers of Sharing Too Much on Social Media

For most folks, social media has become integral to their daily lives in today's hyperconnected world. They use platforms like Facebook, Twitter and Instagram to share their thoughts, experiences and personal moments with friends and family. Being online has even become a business for content creators, who share their insights and thoughts of their daily lives, from “Getting Ready With Me” (GRWM) to recording video trends of jumping over your camera to the beach or the latest dance craze.