From the Winter 2024 Issue

How is Generative AI a Bigger Security Concern Than a Benefit?

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Generative AI Security Concern

The rapid rise and development of generative AI, such as ChatGPT, Google Bard, or even Microsoft Bing, has revolutionized how we interact and view AI. These LLM chatbots have significantly made lives more manageable, providing every individual and business with a fast and improved method to execute repetitive tasks. However, despite all their benefits, these … Read more

The Use of Generative AI in DevOps

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Generative AI in DevOps

Generative AI has emerged as a transformative technology in DevOps that revolutionizes software development and operation processes. According to market research, the Generative AI in the DevOps market will surpass approximately $22 million by the end of 2023 and will likely reach a registered CAGR of 38.20% by 2032. By utilizing the power of advanced … Read more

Are Viruses, Worms, and Malware The Same Thing?

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Viruses, Worms, Malware

Viruses, worms, and malware have somewhat become a buzzword, causally tossed around in conversations related to cybersecurity. However, since these terms are often associated with significant security issues and data breaches, it is crucial to gain better insight into what each of these terms means.  Are Viruses, Worms, and Malware The Same Thing? In common … Read more

Don’t Take the Bait! Signs You’re Just a Step Away from a Phishing Scam

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Phishing Scams

Phishing is one of the most significant threats in the modern cyber threat landscape. While this threat has been around for a considerable time, it continues to wreak havoc. In 2022 alone, there were more than 500 million phishing scams reported. As part of social engineering tactics, phishing attacks happen in various ways, amongst which … Read more

Telegram: A Thriving Hub of Criminal Activity

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Telegram

Secure messaging platforms have long since been in the middle of ethical debates, primarily over their use. They indeed allow users a chance to attain the online security they deserve and help protect personal information from data snoopers. In contrast, it is also true that these platforms can become the hub of cybercriminal activity due … Read more

Culturing a Healthy SOC Environment with AI

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

AI and SOC

Security Operation Center, also known as SOC, plays a critical role in integrated security intelligence technologies and improving the overall organizational cybersecurity. SOC primarily focuses on defending against potential cyber threats, continuously monitoring networks, and developing incident response reports. It functions like a team possessing relevant knowledge and skills and operating from well-defined processes supporting … Read more

The Rising Threat of Mobile Phishing Attacks: Why Your Organization Needs to Prepare

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Mobile Phishing Attacks

The growth of mobile devices in the workplace has turned mobile phishing into a significant opportunity for malicious actors, and it’s therefore a growing concern for organizations. With mobile phishing, the attacker sends links to phishing websites via SMS messages, where they ask for your credentials. One study estimates that 75% of phishing websites specifically … Read more

Best Identity and Access Management (IAM) Practices for DevSecOps

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Best IAM Practices

Humans have long been the weakest link in an organization’s cybersecurity infrastructure. Statistics reveal that human errors such as misconfigurations, secret leakage, and bad data hygiene cause 95% of data breaches. Hackers rarely find their way into a system through brute force attacks; in fact, the most commonly known strategy is phishing attacks that help … Read more