要查看或添加评论,请登录
Rejith Raju的更多文章
-
Connected Vehicles & Cyber Threats2023年11月26日
Connected Vehicles & Cyber Threats
The Emerging Landscape of Connected Vehicle Security The automotive industry is rapidly growing into a vast smart…
24
-
Quishing on the Rise- An In-depth Look into QR Code Phishing2023年10月4日
Quishing on the Rise- An In-depth Look into QR Code Phishing
Phishing has evolved over the years, adopting numerous forms and approaches to deceive users into exposing sensitive…
19
-
Human Emotions, AI, and My Perspective on Their Intersection2023年8月29日
Human Emotions, AI, and My Perspective on Their Intersection
The Emotional Core of Humanity Every human interaction, every decision we make, is underscored by our emotions. They…
-
MITRE ATLAS?- Navigate the landscape of?threats to ML systems2023年8月25日
MITRE ATLAS?- Navigate the landscape of?threats to ML systems
As the surge of artificial intelligence (AI) continues to expand, so does the intricate web of threats surrounding it…
7
-
Microsoft Leads with the Major Share of Cyber Threats Exploited in 20222023年8月5日
Microsoft Leads with the Major Share of Cyber Threats Exploited in 2022
The CISA advisory published in joint work with The U.S.
14
-
What is responsible for congestion control in TCP?2023年7月22日
What is responsible for congestion control in TCP?
TCP Reno and TCP New Reno are both congestion control algorithms that play a crucial role in the transport layer of the…
21
-
Examining Packet Loss Using Wireshark2023年7月12日
Examining Packet Loss Using Wireshark
Recently, I was involved in troubleshooting, the issue at hand was that QRadar was unable to send full updates to a…
48
8 条评论 -
Understanding Cybersquatting Attacks2023年7月9日
Understanding Cybersquatting Attacks
Here are several types of "squatting" attacks that cybercriminals use, which are intended to trick users, infiltrate…
16
-
Federated Learning for Data Privacy in Generative AI.2023年6月29日
Federated Learning for Data Privacy in Generative AI.
#federatedlearning, Enhance Data Privacy and Driving Innovation in Generative #ai Applications Striking a balance…
17
-
PVLAN and VACL, Powerful Tools for Attack Surface Reduction.2023年6月23日
PVLAN and VACL, Powerful Tools for Attack Surface Reduction.
Despite deploying multi-layered security controls and cutting-edge solutions, our infrastructure remains vulnerable to…
17
1 条评论
社区洞察
-
CybersecurityWhat are the best practices for designing a SOC that can handle insider threats?
-
Information Security ManagementHow do you measure the effectiveness of your SOC team?
-
IT Infrastructure ManagementHow do you collaborate and share CTI with other organizations and sectors?
-
CybersecurityHow can you identify gaps in your organization's security posture with incident response simulations?
-
Artificial IntelligenceHow can AI improve your threat intelligence?
-
CybersecurityWhat are the best ways to simulate an attack on an organization's network?
-
Information SecurityWhat are some of the key frameworks and standards for threat intelligence and analysis?
-
IT OperationsHow can you ensure your SOC team provides effective threat intelligence?
-
Systems EngineeringHow can complex systems be secured against physical threats?
-
Risk ManagementWhat are the most effective ways to identify potential attackers in a threat model?
其他会员也浏览了
-
The MITRE ATT&CK Framework: A Misguided Approach in Modern Cybersecurity
Gary De Mercurio 1 年 -
CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds & CTF
Txus P. 2 年 -
Join us in two days for "Hacking Vulnerability Remediation"
David Spark 2 年 -
Method Not Madness - MITRE ATT@CK
Michael P. O'Hara 2 年 -
CyberEmergencyManagement - a modern approach to manage cyber threats effectively
Detlef H?sterey 1 个月 -
MITRE vs CVE 2024-3400
Agrim K S 10 个月 -
Do you know MITRE ATT&CK??
Fernando P. 1 年 -
Living in a Fog
J.M. P. 1 年 -
Harmony Endpoint shines in 2024 MITRE ATT&CK? Evaluations
Oliver Müller 2 个月 -
Cyber Risk Quantification Makes No Sense
J.M. P. 11 个月