Social Spies: How Governments and Companies Use Social Media for Intel

I wrote a year ago about Social Media and identity theft. In that post, I discussed  information leakage and how bad actors could use that for stealing someone’s identity. There are other off-label uses for social media platforms including business competitive analysis, actual spying, and a place for covert operatives to help secure their assumed […]
Read More ›

NIST Wants Comments on Secure Software Development

The US National Institutes of Standards and Technology recently asked for comments on a new framework for secure software development. Called Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF) this framework seeks to aid developers by providing a somewhat universal framework for secure software development. What this framework doesn’t […]
Read More ›

Do or Don’t: It Makes a Difference to the Cyber Security Mindset

Before I begin the main part of this post, I’d like you to do an exercise for me: pause and close your eyes but do not think of green monkeys! Concentrate on anything else, but do not think of green monkeys, alright? Good. One important aspect of developing security policies and security training is shaping […]
Read More ›

Beware the (Online) Game

Playing online games does not really sound like much of a security risk. Whether it is a first-person shooter game, a game where one hunts mythical creatures, an MMORPG, or some sort of simulation, the security concerns often appear minimal. There are two major problems with that idea. The first big issue is that gamers […]
Read More ›

What Is a GAN And Is It Dangerous?

I enjoy being deceived sometimes. The magicians Penn and Teller do a great job of deceiving audiences. The website https://www.thispersondoesnotexist.com/ demonstrates a different kind of deception: computer-generated images that look incredibly realistic. This is different than the deepfake videos where one person’s face is attached to another’s body. The method the site uses is called […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.