article thumbnail

Episode 245: How AI is remaking knowledge-based authentication

The Security Ledger

We talk with Matt Salisbury of Honeybadger HQ, which is using AI and machine learning to re-imagine knowledge-based authentication. The post Episode 245: How AI is remaking knowledge-based authentication appeared first on The Security. AI juices knowledge-based authentication. Read the whole entry. »

article thumbnail

Kyndi Unveils New Features to Optimize Enterprise Knowledge Bases

Information Matters

of its natural language processing engine, promising enhanced knowledge management for businesses. The update includes generative AI-powered tools for streamlining how Read more The post Kyndi Unveils New Features to Optimize Enterprise Knowledge Bases appeared first on Information Matters - Where AI Meets Knowledge Management.

IT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MITRE presents ATT&CK for ICS, a knowledge base for ICS

Security Affairs

MITRE announced the initial release of a version of its MITRE ATT&CK knowledge base that focuses on industrial control systems (ICS). Now the organization is going to propose a knowledge base that focused on ICS systems for its MITRE’s ATT&CK. ” reads the official page set up by MITRE.

article thumbnail

Cyber Essentials is Updating its Technical Requirements

IT Governance

Due to go live in the next few months, this guidance will include articles explaining assessment questions, as well as a dedicated knowledge base. This change does not apply to network devices (such as firewalls and routers) and will be reflected in the self-assessment question set rather than the requirements document.

IT 105
article thumbnail

Fat Patch Tuesday, February 2024 Edition

Krebs on Security

Microsoft Corp. today pushed software updates to plug more than 70 security holes in its Windows operating systems and related products, including two zero-day vulnerabilities that are already being exploited in active attacks. It’s also smart to back up your data and/or image your Windows drive before applying new updates.

Phishing 208
article thumbnail

Spotlight: Your IoT Risk Is Bigger Than You Think. (And What To Do About It.)

The Security Ledger

In this episode of the podcast we are joined by Curtis Simpson , the CISO at Armis, a cybersecurity firm that offers a knowledge base and tools for fingerprinting IoT devices and then monitoring and securing IT, IoT and OT systems. . As always, you can check our full conversation in our latest Security Ledger podcast at Blubrry.

IoT 98
article thumbnail

How Hackers Use Reconnaissance – and How to Protect Against It

eSecurity Planet

MITRE ATT&CK , a popular knowledge base for beginners and security professionals, defines reconnaissance as a fundamental tactic that leverages the “techniques that involve adversaries actively or passively gathering information that can be used to support targeting.”. Further reading: Top Deception Tools.

IT 123