Telegram's Encryption Controversy Explained | Must Watch!

Telegram is NOT an Encrypted Messaging App, Must-See Documentaries

In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app’s encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is ...
Is Google a Monopoly? Breaking Down the Latest Accusations

Google’s Monopoly: The Debate Heats Up, Amazon Alexa Privacy Tips

This week, we discuss Google’s recent accusation by the U.S. Justice Department for being a monopoly and its implications for privacy and cybersecurity. We also cover essential privacy settings for Alexa smart ...
Veeam, recovery, sensitive, data, cyber resilience, ransomware loanDepot financial services

Survey Surfaces Widespread Mishandling of Sensitive Data

Perforce Software today published a survey of 250 IT professionals that finds the amount of sensitive data residing in non-production environments is rising as organizations embrace artificial intelligence (AI) and digital business ...
Security Boulevard
How To Secure GenAI by Implementing RBAC In The Enterprise

How To Secure GenAI by Implementing RBAC In The Enterprise

| | AI, cx, Data Privacy
Generative AI (GenAI) is revolutionizing enterprises, but security challenges loom large. Implementing Role-Based Access Control (RBAC) offers a robust solution. This article explores how defining roles, mapping permissions, and enforcing access controls ...
How Using a VPN May Benefit Your Privacy

How Using a VPN May Benefit Your Privacy

| | Data Privacy, VPN
In the title of this post, keep in mind the keyword is may; as a forewarning, this is not a post that definitively says you must use a VPN regardless of the ...
The Great CrowdStrike Crash: Discussing the Largest IT Outage in History

The Great CrowdStrike Crash, AI’s Role in Employee Smiles

In episode 341, we cover the unprecedented global IT outage caused by a CrowdStrike update crash, affecting 8.5 million Windows machines. We discuss whether it’s the largest outage in history and discuss ...
Fortinet, SASE, Opal, access privileges, cloud security, GenAI, generative AI cloud compromise LLM

Opal Security Extends Scope and Reach of Platform for Managing Privileges

Opal Security this week updated its privilege posture management platform to provide the ability to detect irregular access to an IT environment and manage privileges by groups ...
Security Boulevard
Revolutionizing Cyber Defense: An In-Depth Look at SquareX with Jeswin Mathai

How SquareX is Redefining Web Security: An In-Depth Discussion with Chief Architect Jeswin Mathai

In this episode, Tom Eston hosts Jeswin Mathai, Chief Architect at SquareX. This episode is part two of a series featuring SquareX, and Jeswin takes a deeper look into their cybersecurity solutions ...

Application Security Check Up