Blog
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s…
Polar MDR is a managed 24/7 service that includes threat monitoring, detection and response. The goal of MDR is to…
Managed Detection and Response (MDR) is a managed 24/7 service that includes threat monitoring, detection and response. The goal of…
What is Browser Isolation? Browser isolation is a security model that physically isolates Internet users’ browsing activity from their local…
Due to ChatGPT, OpenAI’s release of the new interface for its Large Language Model (LLM), in the last few weeks there…
Since writing Threat Modeling in the Age of OpenAI’s Chatbot, I had some time to continue investigating ChatGPT and threat…
New technical chatbot capabilities raise the promise that their help in threat modeling could free humans for more interesting work….
User and entity behavior analytics (UEBA) solutions use artificial intelligence and machine learning, advanced analytics, data enrichment, and data science…
Security Event and Information Management (SIEM) systems are at the core of mature security teams. Learn SIEM basics and what’s…
What is remote browser isolation? The internet is simultaneously the most important productivity tool for a business and its biggest…
Remote Browser Isolation (RBI) was more of a “fringe” technology when it first came on the scene. I wrote about…
A new chatbot called ChatGPT has taken the internet by storm, leaving many who use it in shock at its…