Uros

Security News—ChatGPT and Cybersecurity, Ukraine Cyberwar Lessons, ICS Vulnerabilities, Mirai Botnet Variant and More

AI chatbots, such as ChatGPT from OpenAI, can be used to help facilitate malicious cyber activities, even though the terms of service of these AI-driven tools ban cybercrime activities. Cybercriminals can use ChatGPT to create more efficient and compelling phishing emails, and AI tools can create fake but legitimate-looking online profiles, which is time-consuming for […]

Security News—ChatGPT and Cybersecurity, Ukraine Cyberwar Lessons, ICS Vulnerabilities, Mirai Botnet Variant and More Read More »

ChatGPT and Digital Experience Management – How’s the Weather Where You Are?

Like many, I enjoyed seeing the responses that people have received by asking various questions to OpenAI’s ChatGPT. In the last week, I’ve read poetry, essays and even definitions of market segments like Digital Experience Management. Experimenting with ChatGPT seems like a lot of fun, but large language model (LLM) driven chatbots like ChatGPT can

ChatGPT and Digital Experience Management – How’s the Weather Where You Are? Read More »

New Survey Reveals Zero Trust Challenges for Singapore… | BeyondTrust

In light of changing work habits and digital transformation initiatives, organisations around the world have looked to adopt zero trust as their cybersecurity approach. The “never trust, always verify” philosophy of zero trust meets many of the challenges facing organisations today where employees, third parties, and resources sit outside the traditional network perimeter. To understand

New Survey Reveals Zero Trust Challenges for Singapore… | BeyondTrust Read More »

Real-Time Defense of Multi-Cloud Environments From Malicious Attacks and Threats

Table of Contents Organizations today cannot detect real-time threats at runtime due to the multi-cloud infrastructure, resulting in the possibility of malicious actors exploiting the environment. It is imperative for the modern organization to have a solution to detect advanced run-time threats in real-time to protect their systems.  As a result of our commitment to

Real-Time Defense of Multi-Cloud Environments From Malicious Attacks and Threats Read More »

ISO 27001 welcomes Threat Intelligence

ISO 27001 welcomes Threat Intelligence Ramiro Céspedes Introduction In my previous article I defined what is Cyber Threat Intelligence (CTI), described how to measure it and explained why it is important to implement a CTI program that can serve different stakeholders with different types of intelligence requirements in order to have a proactive security approach.

ISO 27001 welcomes Threat Intelligence Read More »

Meet Patricia Arguello Rojo: Senior Frontend Developer

Software, from vision to execution, is a people business – and at Micro Focus our people are our greatest asset. Helping our employees build exciting and enriching careers is a key priority. At Micro Focus, we work hard to unlock the individual potential and collective capability of our workforce by investing in development opportunities, so that

Meet Patricia Arguello Rojo: Senior Frontend Developer Read More »

macOS Patching Is Here!

Table of Contents In the past few years, many of our customers have seen a sharp increase in the number of Mac devices introduced to their environment. All those new Mac devices introduce new vulnerabilities that must be remediated. To keep up with the new volume of vulnerabilities, organizations had to opt-in, buy and operate

macOS Patching Is Here! Read More »