Blog
Generative AI and Security: The Attacker’s Perspective
In the previous post in this series, I discussed how you can work with generative language models, such as ChatGPT to circumvent ethical constraints and cause them to provide information on various security attack methods. [...]
Create a Strong Password: Strategic Techniques for Unbreakable Security
Passwords are the most commonly used identity verifiers, yet many people struggle with creating ones that are truly secure. In this article, we’ll show you how to create a strong password using a unique nine-rule [...]
Long Passphrases are Better than Complex Passwords and Regular Password Resets are not as Important
While traditional password security guidelines often emphasize the use of strong passwords and frequent resets, these practices may not be as effective as once thought. For years, the security industry has recommended some password character [...]
Generative AI and Security: The Defender’s Perspective
Amidst the evolving landscape of cybersecurity challenges, one persistent threat remains: phishing attacks. A New Frontier in Defense In this post, we will see how to prompt a generative AI to aid in protecting against attack methods that it may provide to attackers. It is much simpler to accomplish this due to the removal of ethical concerns related to the [...]
Security Awareness Levels
In the book, Executive’s Guide to Personal Security, Second EditionDavid S. Katz, Ilan Caspi (2020). Executive’s Guide to Personal Security, Second Edition, Wiley , the authors cite an older book titled Principles of Personal DefenseJeff Cooper (1989). Principles of Personal Defense, Paladin (no reference to the color code system) , by Colonel Jeff Copper, as the source of a color [...]
Threat Actors: Who Wants In?
When it comes to defining the “who” in the pool of threat actors, the possible list can be small or large. The size of the list depends on how you choose to compartmentalize the characteristics and traits of the actors. In this article, I’ll provide an overview covering a list of three threat actor categories. What Are Threat Actors? First, [...]
Encryption Doesn’t Have to be Complicated
Most books and articles on the topic of encryption are written for technical professionals who must use it or implement it in systems and code. They throw around words like cipher, key, algorithm, and initialization vector like they are common vocabulary to all. Interestingly, many technical professionals find it challenging to begin learning about encryption because of this pattern. While [...]
Maintaining Awareness of Phishing Scams
Elevate your online security from the outset with crucial phishing awareness tips. In a digital landscape flooded with new phishing scams, staying abreast of evolving tactics is key. Explore how to identify and thwart these threats to fortify your defenses against cyber-attacks.It seems that daily, certainly weekly, new phishing scams are launched on the Internet. From a security awareness perspective, [...]
Cybercrime Defined
Cybercrime in Social Media: Theory and Solutions is a recent book edited by Pradeep Kumar Roy and Asis Kumar Tripathy and published by CRC Press. It provides a collection of papers on social media and cybercrime as well as issues like fake news and offensive language. In this post, I am commenting on one of the papers in the book [...]
Get Certified,
Get the Advantage
Don’t wait until it’s too late. With this Cybersecurity certification, you will have the advantage of being equipped with the necessary skills and knowledge to protect your organization from cyber threats.
Take the first step towards strengthening your cybersecurity acumen by joining AACSP today.