Skip to content
The CISO Perspective

The CISO Perspective

Menu
  • Home
  • About
  • TCP on YouTube
  • Contact
Posted onFebruary 21, 2023February 22, 2023Security Concepts

ChatGPT for Offensive Security: Five Attacks

by AndyLeave a comment on ChatGPT for Offensive Security: Five Attacks

ChatGPT is an AI chatbot that uses Natural Language Processing (NLP) combined with the GPT-3 framework to provide human-like responses. NLP allows the model to…

Read More
Posted onFebruary 21, 2023Security Concepts

Understanding Software Bill of Materials (SBOM) and It’s Role in Software Supply Chain

by AndyLeave a comment on Understanding Software Bill of Materials (SBOM) and It’s Role in Software Supply Chain

In May 2021, the US government signed an Executive Order mandating that software suppliers selling to the government must include a Software Bill of Material…

Read More
Posted onFebruary 20, 2023February 22, 2023Security Concepts

What is Secure Service Edge? SSE vs SASE vs VPNs

by AndyLeave a comment on What is Secure Service Edge? SSE vs SASE vs VPNs

At one point, virtual private networks (VPNs) were a valuable tool for remote workers to access private networks and data centers. But with more and…

Read More
Posted onFebruary 20, 2023February 22, 2023Security Concepts

What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained

by AndyLeave a comment on What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained

Virtual Private Networks (VPNs) have been used for years to provide remote connectivity, but they have limitations in terms of scalability and security. A technology…

Read More
Posted onFebruary 14, 2022February 21, 2022Careers

Becoming A Product Manager for Engineers

by Andy HLeave a comment on Becoming A Product Manager for Engineers

According to Glassdoor, Product Management was one of the fastest-growing and highest-paying jobs in not just tech but any profession for 2021. Any company that sells…

Read More
Posted onFebruary 5, 2022February 21, 2022Exploits

Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work

by Andy HLeave a comment on Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work

How Exploits Work In cybersecurity, the term “exploit” is used to represent a piece of code, data or sequence of commands that takes advantage of…

Read More
Posted onJanuary 13, 2022February 21, 2022Security Concepts

Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA

by Andy HLeave a comment on Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA

Hacking 2FA and MFA When MFA is implemented correctly, it can be an extremely powerful and low-cost way to protect against the weakest link in…

Read More
Posted onDecember 15, 2021February 21, 2022Security Technologies

What is AIOps and MLOps? Artificial Intelligence for IT Operations Explained

by Andy HLeave a comment on What is AIOps and MLOps? Artificial Intelligence for IT Operations Explained

What is AIOPs? Artificial Intelligence for IT Operations, or AIOps, is a term coined by Gartner to describe a class of technology that utilizes machine…

Read More
Posted onNovember 13, 2021February 21, 2022News

T-Mobile Data Breach: Timeline, Analysis and Lessons Learned

by Andy HLeave a comment on T-Mobile Data Breach: Timeline, Analysis and Lessons Learned

T-Mobile Data Breach On Monday, August 16, T-Mobile issued a public statement stating that unauthorized access to some of their user data had occurred. In…

Read More
Posted onOctober 13, 2021February 21, 2022Endpoint

What is XDR vs EDR vs MDR? Extended Detection and Response Explained

by Andy HLeave a comment on What is XDR vs EDR vs MDR? Extended Detection and Response Explained

EDR and XDR: What Do They Do? Dwell time refers to the length of time an attacker is able to roam free on your network…

Read More

Posts navigation

Page 1 Page 2 Page 3 Next Page

Recent Posts

  • ChatGPT for Offensive Security: Five Attacks
  • Understanding Software Bill of Materials (SBOM) and It’s Role in Software Supply Chain
  • What is Secure Service Edge? SSE vs SASE vs VPNs
  • What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained
  • Becoming A Product Manager for Engineers

Archives

  • February 2023
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020

Categories

  • Careers
  • Endpoint
  • Endpoint Protection
  • Exploits
  • Firewall
  • General
  • News
  • Security Concepts
  • Security Strategy
  • Security Technologies
  • Sizing
  • Uncategorized
RSS Error: WP HTTP Error: A valid URL was not provided.

The CISO Perspective

TCP was created as a free resource for security news, knowledge and training.
Amphibious Theme by TemplatePocket ⋅ Powered by WordPress