<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-14940812</id><updated>2025-10-14T10:55:27.036+03:00</updated><category term="cyberattack"/><category term="malware"/><category term="jorge sebastiao"/><category term="Spying"/><category term="vulnerability"/><category term="exploit"/><category term="privacy"/><category term="Cybersecurity"/><category term="Encryption"/><category term="NSA"/><category term="IoT"/><category term="Google"/><category term="Smartphone"/><category term="cyberwar"/><category term="Cyber Attack"/><category term="FBI"/><category term="Hacking"/><category term="security"/><category term="security awareness"/><category term="Mobile Security"/><category term="cyber warfare"/><category term="Facebook"/><category term="android"/><category term="social networks"/><category term="risk"/><category term="BigData"/><category term="Hacked"/><category term="Social Engineering"/><category term="twitter"/><category term="Defcon"/><category term="Hacker"/><category term="artificial intelligence"/><category term="awareness"/><category term="cybercrime"/><category term="social media"/><category term="Apple"/><category term="Cyber Security"/><category term="Password"/><category term="USA"/><category term="fraud"/><category term="internet"/><category term="passwords"/><category term="sony"/><category term="surveillance"/><category term="Bitcoin"/><category term="GCHQ"/><category term="IOS"/><category term="POS"/><category term="Tor"/><category term="Wearables"/><category term="authentication"/><category term="banking"/><category term="blackhat"/><category term="cctv"/><category term="cell phones"/><category term="iPhone"/><category term="mobile"/><category term="China"/><category term="DHS"/><category term="Dark Web"/><category term="Data Breach"/><category term="Hacked Team"/><category term="Hacking Team"/><category term="apple watch"/><category term="bcp"/><category term="biometrics"/><category term="cloud security"/><category term="data analytics"/><category term="enduser"/><category term="flipboard"/><category term="hack"/><category term="hackers"/><category term="mobile app"/><category term="shellshock"/><category term="terrorism"/><category term="trojan"/><category term="trust"/><category term="usb"/><category term="video"/><category term="youtube"/><category term="0day"/><category term="Cloud Computing"/><category term="Credit Card‬"/><category term="Cyber Exploit"/><category term="Fake"/><category term="FireEye"/><category term="First Responders"/><category term="Homeland security"/><category term="ISIS"/><category term="Incidence Reponse"/><category term="Incident Response"/><category term="InfoGraphic"/><category term="Israel"/><category term="Kaspersky"/><category term="PGP"/><category term="PKI"/><category term="Payment Systems"/><category term="Physical Security"/><category term="Pin"/><category term="RFID"/><category term="Russia"/><category term="SEA"/><category term="Snowden"/><category term="UK"/><category term="Vulnerable"/><category term="Yahoo"/><category term="academic papers"/><category term="ai"/><category term="back doors"/><category term="background checks"/><category term="credit cards"/><category term="cryptography"/><category term="essays"/><category term="healthcare"/><category term="information security"/><category term="infosec"/><category term="instant messaging"/><category term="intelligence"/><category term="laptop"/><category term="network security"/><category term="phishing"/><category term="rsa conference"/><category term="scam"/><category term="skype"/><category term="snafu"/><category term="tracking"/><category term="vulnerabilities"/><category term="2021"/><category term="APT"/><category term="ATM"/><category term="Accelerometers"/><category term="Advanced Persistent Threat"/><category term="Browser"/><category term="CALEA"/><category term="Camera"/><category term="Cyber Attacks‬"/><category term="Cyberattack Spearphishing"/><category term="Germany"/><category term="Hacks"/><category term="Human Firewall"/><category term="Internet and society"/><category term="Iran"/><category term="Lessons Learned"/><category term="Microsoft"/><category term="Nepal"/><category term="OsX"/><category term="PIN‬"/><category term="Point Of Sale"/><category term="Poodle"/><category term="SCADA"/><category term="SIGINT"/><category term="SSL"/><category term="Scams"/><category term="Syria"/><category term="UAE"/><category term="USIS"/><category term="VPN"/><category term="Warfare"/><category term="Wi-Fi"/><category term="Zero Day"/><category term="air travel"/><category term="anonymous"/><category term="antivirus"/><category term="apple watch os"/><category term="attack"/><category term="audit report"/><category term="backdoor"/><category term="bash"/><category term="blockchain"/><category term="broken"/><category term="bug"/><category term="byod"/><category term="cameras"/><category term="children"/><category term="cia"/><category term="ciso"/><category term="confidential"/><category term="convergence"/><category term="crime"/><category term="criminal"/><category term="cryptanalysis"/><category term="cyber threat"/><category term="cyber weapon"/><category term="data"/><category term="data visualization"/><category term="disaster recovery"/><category term="drones"/><category term="e-mail"/><category term="economics of security"/><category term="email"/><category term="esgulf"/><category term="espionage"/><category term="externalities"/><category term="forgery"/><category term="full-disk encryption"/><category term="google glass"/><category term="government"/><category term="hardware"/><category term="hijack"/><category term="identity theft"/><category term="incentives"/><category term="infosec 2015"/><category term="internet of things"/><category term="jawbone"/><category term="kill swtich"/><category term="laws"/><category term="mac"/><category term="middle east"/><category term="military"/><category term="mobile apps"/><category term="mobile malware"/><category term="national security policy"/><category term="north korea"/><category term="opm"/><category term="passports"/><category term="patch"/><category term="paypal"/><category term="people analytics"/><category term="podcast"/><category term="police"/><category term="regin"/><category term="reverse engineering"/><category term="samsung"/><category term="security analytics"/><category term="security incidents"/><category term="security testing"/><category term="side-channel attacks"/><category term="silkroad"/><category term="smart home"/><category term="smartcity"/><category term="spearphishing"/><category term="symantec"/><category term="the real deal"/><category term="top10"/><category term="truecrypt"/><category term="tv5"/><category term="undercover"/><category term="undetected"/><category term="united airlines"/><category term="us attorney general"/><category term="usbkiller"/><category term="visualization"/><category term="web privacy"/><category term="whatsapp"/><category term="whistleblowers"/><category term="wifi"/><category term="wtf"/><category term="zeroday"/><category term=".High Risk"/><category term=".london"/><category term="1"/><category term="2014"/><category term="2016"/><category term="2017"/><category term="2018"/><category term="2019"/><category term="2020"/><category term="2022"/><category term="2023"/><category term="3 million"/><category term="3D Printing"/><category term="9/11"/><category term="@9bplus"/><category term="AES"/><category term="APT1"/><category term="APT28"/><category term="ATMs"/><category term="ATM‬. POS‬"/><category term="Adobe"/><category term="Adobe Flash"/><category term="Afghanistan"/><category term="Airplane"/><category term="Ajax Security Team"/><category term="AlQaeda"/><category term="America"/><category term="American"/><category term="Antitheft"/><category term="AppStore"/><category term="Appliance"/><category term="Arrest"/><category term="Atechdad"/><category term="Attacks"/><category term="BGP"/><category term="BadUSB"/><category term="Bahrain"/><category term="BeSmart"/><category term="Berlin"/><category term="Blackout"/><category term="Bluetooth"/><category term="Bruce Schneier"/><category term="Bsides"/><category term="Bugs"/><category term="Buildings"/><category term="Bumpkeys"/><category term="Business Continuity"/><category term="Bypasss"/><category term="Byron Wake"/><category term="CEO"/><category term="CISCO"/><category term="California"/><category term="Challenges"/><category term="Chelsea Manning"/><category term="Cibercrime"/><category term="Citizen Lab"/><category term="Click Fraud"/><category term="Collateral Damage"/><category term="Compromise"/><category term="Computrace"/><category term="Cracks"/><category term="CreditCard"/><category term="Cryptographic Key"/><category term="Cryptophone"/><category term="Cyber Attac"/><category term="Cyber Attacks"/><category term="CyberExploit"/><category term="Cyberwa"/><category term="Cyborg"/><category term="DaVinci"/><category term="Dairy Queen"/><category term="DanGeer"/><category term="DarkWeb"/><category term="Darwin Awards"/><category term="Data Broker"/><category term="David Vincenzetti"/><category term="Declined"/><category term="Decrypt"/><category term="Default"/><category term="Defense In Depth"/><category term="Digital"/><category term="Digital Globe"/><category term="Disclosure"/><category term="Do You Know"/><category term="Dragnet Nation"/><category term="EC3"/><category term="EFF"/><category term="Edward Snowden"/><category term="Electromagnetic Attack"/><category term="Embassy"/><category term="Emergency Services"/><category term="Europol"/><category term="FISA"/><category term="Facebook page"/><category term="Faraday cage"/><category term="Finfisher"/><category term="Forensics"/><category term="G20"/><category term="GCC"/><category term="GIS"/><category term="Galileo"/><category term="Gamers"/><category term="Glitch"/><category term="Glitches"/><category term="GoNoGo"/><category term="Google Ads"/><category term="Google Plus"/><category term="Greece"/><category term="Gun"/><category term="Gyroscope"/><category term="HackedTeam"/><category term="Hacker Bootcamp"/><category term="Hacker HighSchool"/><category term="Hacker Skills"/><category term="HackingTeam"/><category term="Hoax"/><category term="HomeKit"/><category term="Hong Kong"/><category term="ICS"/><category term="ID cards"/><category term="IM"/><category term="Implant"/><category term="India"/><category term="Innovation"/><category term="International Business"/><category term="IoT Security"/><category term="Iraq"/><category term="Japan"/><category term="Kevin Mitnick"/><category term="Kevin Warwick"/><category term="KillSwitch"/><category term="Kurdish #AIS"/><category term="Las Vegas"/><category term="Law"/><category term="Layoffs"/><category term="LinkedIn"/><category term="Lizard Squad"/><category term="Lock Picking"/><category term="Loydds"/><category term="MH370"/><category term="Madonna"/><category term="Malaysia"/><category term="Manipulation"/><category term="Medical record"/><category term="Memory Scraping"/><category term="Micro"/><category term="Mines"/><category term="Mobile Threat Report"/><category term="Murphys law"/><category term="NXTChip"/><category term="NYSE"/><category term="Netherlands"/><category term="Network"/><category term="Neustar"/><category term="OEM"/><category term="OffLimits"/><category term="Office Personnel Management"/><category term="Oil"/><category term="Oil Tanker"/><category term="OnionPI"/><category term="Open PGP"/><category term="Ouch"/><category term="Outsourcing"/><category term="Overload"/><category term="PC"/><category term="PINs"/><category term="PITA"/><category term="Palace"/><category term="Palestine"/><category term="Panic"/><category term="Paradigm Shift"/><category term="Phil Zimmermann"/><category term="Phishing Scam"/><category term="Plan"/><category term="PlanB"/><category term="Power"/><category term="PowerDown"/><category term="PowerGrid"/><category term="Proactive"/><category term="Protect"/><category term="Proxyham"/><category term="Radar"/><category term="Realpolitik"/><category term="Rebel Heart"/><category term="Remote"/><category term="Risk Studies"/><category term="Robin"/><category term="Russian"/><category term="SSH"/><category term="SSL3"/><category term="SaaS"/><category term="Salesforce"/><category term="Samsung Windows"/><category term="Sattelite Map"/><category term="SecuringOureCity"/><category term="Security Defense"/><category term="Security Locks"/><category term="SecurityAwareness"/><category term="Shutdown"/><category term="Side Channel"/><category term="Siri"/><category term="Skimmer"/><category term="Smar Phone"/><category term="Smart Health"/><category term="SourceCode"/><category term="Spiegel"/><category term="Spy"/><category term="Spyeye"/><category term="Stanford Law School"/><category term="Stats"/><category term="Stealing"/><category term="Stolen"/><category term="Stolen Passwords"/><category term="Subsentio"/><category term="Summer Camp"/><category term="Surfing"/><category term="Swatting"/><category term="System Down"/><category term="TSA"/><category term="TV Talent"/><category term="Tanker"/><category term="Telecom"/><category term="TheHackersNews"/><category term="Think Big"/><category term="Think Thank"/><category term="TimeBomb"/><category term="Tool"/><category term="Tor Network"/><category term="Toronto"/><category term="Torrent"/><category term="Travel"/><category term="TreeMafia"/><category term="Trip"/><category term="Trustwave"/><category term="Twitch"/><category term="UPS"/><category term="URHack"/><category term="URHacked"/><category term="US"/><category term="US Coast Guard"/><category term="USBCharger"/><category term="USBCondom"/><category term="USCert"/><category term="Ukraine"/><category term="University of Cambridge"/><category term="Unpatchable"/><category term="Usenix"/><category term="Users"/><category term="VirusTotal"/><category term="WSJ"/><category term="Watermark"/><category term="Weakest Link"/><category term="Web Security"/><category term="WhiteHacker"/><category term="Whitehat"/><category term="WifiRouter"/><category term="Windows Update"/><category term="Yaana"/><category term="Zeus"/><category term="activits"/><category term="adult friend finder"/><category term="advanced persistent threats"/><category term="aeroport"/><category term="aff"/><category term="africa"/><category term="air gap"/><category term="airbnb"/><category term="airlines"/><category term="algorithm"/><category term="amazon"/><category term="anti forensics"/><category term="api"/><category term="app store"/><category term="apple pay"/><category term="application security"/><category term="apps"/><category term="appthority"/><category term="atm hack"/><category term="av test"/><category term="back security blog mobile website"/><category term="backoff"/><category term="backup"/><category term="balckhat"/><category term="bank of muskat"/><category term="banking. attack"/><category term="bbc news"/><category term="behaviour"/><category term="belgacom"/><category term="belgium"/><category term="ben gurion"/><category term="bit whisper"/><category term="blackmail"/><category term="blocking jammer"/><category term="body cam"/><category term="bogachev"/><category term="borders"/><category term="botnet"/><category term="breach"/><category term="breaking news"/><category term="briked"/><category term="bruce schneiner"/><category term="bugcrowd"/><category term="bulletproof"/><category term="bunker"/><category term="by the numbers"/><category term="campaign"/><category term="canvas fingerprinting"/><category term="car insurance"/><category term="car parking"/><category term="car thief"/><category term="carnival cruise"/><category term="cars"/><category term="catfish"/><category term="celltowers"/><category term="certificates"/><category term="chechen"/><category term="chopin airport"/><category term="chris roberts"/><category term="ciso visualization"/><category term="clb"/><category term="cmmi3"/><category term="cold storage"/><category term="comment"/><category term="computer security"/><category term="concealment"/><category term="conference"/><category term="confidentiality"/><category term="contractor"/><category term="control"/><category term="cookies"/><category term="couch surfing"/><category term="crack"/><category term="crapware"/><category term="creative"/><category term="critical infrastructure"/><category term="crowd funding"/><category term="crowd sourcing"/><category term="crowdsourcing"/><category term="crypto"/><category term="cryptolocker"/><category term="csa"/><category term="cso"/><category term="currency exchange"/><category term="currency manipulation"/><category term="curtis Wallen"/><category term="cyber army"/><category term="cyber califate"/><category term="cyber stalking"/><category term="cyberattck"/><category term="cyberbulling"/><category term="cyberbully"/><category term="cyberterrorism"/><category term="cyberweapon"/><category term="daesh"/><category term="dashcam"/><category term="data transfer"/><category term="davidcameron"/><category term="deathring"/><category term="defaults"/><category term="demo"/><category term="denial of service"/><category term="deported"/><category term="detector"/><category term="did you know"/><category term="digital wallets"/><category term="downgrade"/><category term="driving"/><category term="drone"/><category term="dropbox"/><category term="dropcam"/><category term="drp"/><category term="dubai"/><category term="duqu"/><category term="dvr"/><category term="dynamics"/><category term="earthquake"/><category term="earthquake nepal"/><category term="ebola"/><category term="eicas"/><category term="elephant in the room"/><category term="embedded systems"/><category term="emirates 247"/><category term="enod"/><category term="epidemy"/><category term="error"/><category term="eset"/><category term="exile"/><category term="exposed"/><category term="extorsion"/><category term="extradite"/><category term="face recognition"/><category term="fbi agent"/><category term="fear"/><category term="federal employee"/><category term="fibit"/><category term="filtering"/><category term="findikoglu"/><category term="fines"/><category term="fingerprints"/><category term="firewall"/><category term="firmware"/><category term="fishing"/><category term="fitbit"/><category term="fitness"/><category term="fitness tracker"/><category term="flaw"/><category term="flips"/><category term="forex"/><category term="freak attack"/><category term="friend finder"/><category term="gadget guys"/><category term="game over zeus"/><category term="generations"/><category term="geolocation"/><category term="geotags"/><category term="ghcq"/><category term="ghostbin"/><category term="google chrome"/><category term="google glasses"/><category term="google store"/><category term="google voice search"/><category term="googleit"/><category term="gps spoofing"/><category term="gps tracking"/><category term="ground system"/><category term="grounded airplane"/><category term="hashtag"/><category term="healthkit"/><category term="heartbleed"/><category term="heat"/><category term="heimdal"/><category term="hesperbot"/><category term="hijacked"/><category term="hockup"/><category term="home"/><category term="hot or not"/><category term="hp"/><category term="http"/><category term="https"/><category term="iStore"/><category term="ibm"/><category term="identification"/><category term="ids"/><category term="ief"/><category term="ignore no more"/><category term="inflight"/><category term="inflight entertainment"/><category term="instagram"/><category term="internet ban"/><category term="intrusion"/><category term="invoice"/><category term="iowa"/><category term="ips"/><category term="isi"/><category term="jamming"/><category term="jihad"/><category term="just googleit"/><category term="kernel"/><category term="keynote"/><category term="keys"/><category term="kids"/><category term="koler"/><category term="labMD"/><category term="largest bank heist"/><category term="law enforcement"/><category term="leaks"/><category term="learn"/><category term="lemonde"/><category term="lies"/><category term="lifeband"/><category term="lifeclock"/><category term="like"/><category term="like farming"/><category term="listening"/><category term="live test"/><category term="location tracking"/><category term="london"/><category term="london rail"/><category term="lot"/><category term="lottery"/><category term="lottery ticket"/><category term="mail"/><category term="man in the middle attack"/><category term="man-in-the-middle attacks"/><category term="managed security"/><category term="managed services"/><category term="maturity model"/><category term="mesh network"/><category term="messenger"/><category term="metro"/><category term="middle-east"/><category term="misfortune cookie"/><category term="mitm"/><category term="mobile banking"/><category term="mobile health"/><category term="monitoring"/><category term="month"/><category term="most wanted"/><category term="movie"/><category term="movies"/><category term="mss"/><category term="mumbai"/><category term="musl"/><category term="mwc"/><category term="mwc15"/><category term="national cyber security awareness month"/><category term="nborak"/><category term="ncsam"/><category term="nepal quake relief"/><category term="no face"/><category term="not smart"/><category term="nqvault"/><category term="nude photos"/><category term="nypd"/><category term="ois"/><category term="ok google"/><category term="open photo album"/><category term="open seasame"/><category term="opensource"/><category term="optin"/><category term="optout"/><category term="overreactions"/><category term="paidapp"/><category term="pandemic"/><category term="parents"/><category term="password leak"/><category term="pastebin"/><category term="pc killer"/><category term="people finder"/><category term="phone"/><category term="phones"/><category term="photo"/><category term="photos"/><category term="poland"/><category term="policy"/><category term="politics"/><category term="poseidon"/><category term="private keys"/><category term="proofpoint"/><category term="propcom"/><category term="psychology"/><category term="psychology of security"/><category term="pwc"/><category term="rackspace"/><category term="random number generator"/><category term="ransomware"/><category term="rcmp"/><category term="remediate"/><category term="remote control car"/><category term="remote wipe"/><category term="revoke"/><category term="rf hacking"/><category term="rgn"/><category term="risk assessment"/><category term="robbery"/><category term="rollback"/><category term="rompager"/><category term="rootkit"/><category term="round table"/><category term="router"/><category term="rsa 2015"/><category term="salaries"/><category term="samy Kamkar"/><category term="sans"/><category term="schools"/><category term="screen passwords"/><category term="searches"/><category term="seb"/><category term="secrecy"/><category term="security fail"/><category term="security metrics"/><category term="security now"/><category term="security research"/><category term="sensors"/><category term="sexy"/><category term="shark"/><category term="siem"/><category term="sla"/><category term="sleep"/><category term="smart card"/><category term="smart watch"/><category term="smartband"/><category term="smartwatch"/><category term="snapchat"/><category term="sony pictures"/><category term="sourceforge"/><category term="spacial temporal"/><category term="spain"/><category term="spoofing"/><category term="sputink news"/><category term="spyware"/><category term="state sponsored"/><category term="steganography"/><category term="submarine fiber cables"/><category term="supply chain"/><category term="support"/><category term="surprise"/><category term="survey"/><category term="swiftkey"/><category term="tagging"/><category term="talkband"/><category term="tax returns"/><category term="taxonomies"/><category term="test"/><category term="the guardian"/><category term="therealdeal"/><category term="thereg"/><category term="things"/><category term="tinder"/><category term="tiversa"/><category term="tractica"/><category term="train reck"/><category term="tripadvisor"/><category term="turf battle"/><category term="turkish"/><category term="tutelage"/><category term="tv interview"/><category term="tweet"/><category term="two-factor authentication"/><category term="uae law"/><category term="uber"/><category term="undisclosed"/><category term="unemployment"/><category term="uninstall"/><category term="unit121"/><category term="university"/><category term="us navy"/><category term="usability"/><category term="usb flash"/><category term="usb security"/><category term="wabisabilabi"/><category term="warning"/><category term="warrant"/><category term="warriorsofthenet"/><category term="warsaw"/><category term="watch os"/><category term="web"/><category term="web defacement"/><category term="wireless"/><category term="wow"/><category term="xkeyscore"/><category term="xor"/><category term="yelp"/><title type='text'>4Sec - 4 Seconds -- For Security</title><subtitle type='html'>In today&#39;s complex world security is elusive. We use the latest electronics, mobiles and internet. It can take as little as 4 Seconds to gain or lose security...</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>320</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-14940812.post-2268259543725515081</id><published>2023-09-21T09:57:00.005+03:00</published><updated>2023-09-21T09:57:23.539+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="artificial intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="blockchain"/><category scheme="http://www.blogger.com/atom/ns#" term="convergence"/><category scheme="http://www.blogger.com/atom/ns#" term="jorge sebastiao"/><category scheme="http://www.blogger.com/atom/ns#" term="trust"/><title type='text'>The Convergence of Artificial Intelligence and Blockchain</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipX1ZbS5TvED-F0SsD-Apx0ko98XDkPTJ0Zknq0VwxLJs5D-URslSOVEKK9zT4jNHh8gidStGzbMMH_hv5AaLAo1ipqANPrbVVaCWL-ahPHHcSIPw_t0WOlNDxbYDDXlM_L-GMQWLc2E-kdB1owID-EMIaBlw16DXff0iYPZy3HlHnxkBHw-AB/s275/AI-Blockchain.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;183&quot; data-original-width=&quot;275&quot; height=&quot;279&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipX1ZbS5TvED-F0SsD-Apx0ko98XDkPTJ0Zknq0VwxLJs5D-URslSOVEKK9zT4jNHh8gidStGzbMMH_hv5AaLAo1ipqANPrbVVaCWL-ahPHHcSIPw_t0WOlNDxbYDDXlM_L-GMQWLc2E-kdB1owID-EMIaBlw16DXff0iYPZy3HlHnxkBHw-AB/w585-h279/AI-Blockchain.jpeg&quot; width=&quot;585&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Two of the most disruptive technologies to emerge in recent years are artificial intelligence (AI) and blockchain. Though originally developed to fulfill different purposes, these technologies are increasingly intersecting to create powerful new applications. The fusion of AI and blockchain promises to transform many industries.&lt;/p&gt;&lt;p&gt;AI excels at analyzing data, identifying patterns, and making predictions. It relies on vast amounts of data to train machine learning algorithms. Blockchain provides a decentralized, transparent digital ledger for recording transactions and data. The security, traceability, and integrity of blockchain systems make them ideal for maintaining data.&lt;/p&gt;&lt;p&gt;Using blockchain to store the data needed to train AI systems alleviates concerns regarding data integrity or manipulation. Data on a blockchain is immutable and can be traced back to its origin. Meanwhile, AI can be applied to optimize and automate processes within blockchain networks, increasing efficiency.&lt;/p&gt;&lt;p&gt;The synergies between AI and blockchain make them highly complementary. AI needs reliable data to learn from, while blockchain needs advanced analytics to maximize its potential. Integrating the two can lead to the creation of &#39;smart&#39; blockchain platforms powered by AI.&lt;/p&gt;&lt;p&gt;For example, AI algorithms can provide enhanced security for blockchains by detecting network intrusions or suspicious transactions. In financial services, AI systems fed with blockchain data can be used for fraud prevention or to analyze investment trends. In healthcare, patient data on a blockchain could be utilized by AI assistants to provide diagnoses or recommend treatments.&lt;/p&gt;&lt;p&gt;As AI and blockchain continue to mature, we will see further innovative applications leveraging both technologies. However, there remain challenges to overcome around scalability, interoperability, and regulation. Businesses looking to capitalize on this integration must focus on developing robust AI models powered by high-quality, reliable data made available through blockchain systems. With thoughtful design, AI-enabled blockchain solutions have the potential to drive profound change.&lt;/p&gt;&lt;p&gt;Some industries that can benefit from the convergence of artificial intelligence and blockchain technology:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;u&gt;Financial Services&lt;/u&gt; - AI algorithms can analyze blockchain transaction data to detect fraud, make investment predictions, and automate trading. Smart contracts enabled by AI can automate financial processes.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Healthcare&lt;/u&gt; - Medical records can be stored securely on blockchains and analyzed by AI to provide better preventative care and personalized treatment plans. AI models can be trained using healthcare data.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Supply Chain Management&lt;/u&gt; - Blockchain provides transparency into supply chains while AI can optimize logistics operations, predict delays, and automate inventory management.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Retail&lt;/u&gt; - Blockchain transaction records can feed AI systems valuable shopping data to improve customer experience through customized recommendations and targeted marketing.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Government&lt;/u&gt; - AI tools can increase security, reduce fraud, and optimize operations of government systems built on blockchain platforms for identity management, benefits disbursement, and record-keeping.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Insurance&lt;/u&gt; - AI can process claims and analyze blockchain data containing policyholder information to provide personalized coverage options and pricing. Smart contracts can automate policy administration.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Energy&lt;/u&gt; - Blockchains are enabling decentralized energy grids powered by AI systems controlling energy distribution, billing, and predicting usage.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Media&lt;/u&gt; - Blockchain content distribution networks with AI capabilities can accurately track engagement, optimize recommendations, and provide stronger copyright protections.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The ability to leverage the strengths of both AI and blockchain technology will enable breakthroughs in these industries and beyond. As the integration progresses, more transformative use cases will emerge.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/2268259543725515081/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/2268259543725515081' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/2268259543725515081'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/2268259543725515081'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2023/09/the-convergence-of-artificial.html' title='The Convergence of Artificial Intelligence and Blockchain'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipX1ZbS5TvED-F0SsD-Apx0ko98XDkPTJ0Zknq0VwxLJs5D-URslSOVEKK9zT4jNHh8gidStGzbMMH_hv5AaLAo1ipqANPrbVVaCWL-ahPHHcSIPw_t0WOlNDxbYDDXlM_L-GMQWLc2E-kdB1owID-EMIaBlw16DXff0iYPZy3HlHnxkBHw-AB/s72-w585-h279-c/AI-Blockchain.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-3041504408197411162</id><published>2023-09-18T10:22:00.002+03:00</published><updated>2023-09-18T10:22:26.119+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="artificial intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="data"/><category scheme="http://www.blogger.com/atom/ns#" term="jorge sebastiao"/><title type='text'>Protecting Data Used in Artificial Intelligence</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiSV28ipYr5VJt0XEfv1mLPVtmLHwuxu28Q-uvxPbuwHYVDs86UpbnnPhOucBRWmL6k_Xcq1UDLCyxNn4QUo3lzattyrtxflZHPGv2zK83v225QT4uVQ5Q1i9XbqcH7PiVIMiQE-9ehk8kP88WEiYjGHAhkm1PEFeX5WgcbB-IXkWdwzKuqe27/s299/image.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;168&quot; data-original-width=&quot;299&quot; height=&quot;250&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiSV28ipYr5VJt0XEfv1mLPVtmLHwuxu28Q-uvxPbuwHYVDs86UpbnnPhOucBRWmL6k_Xcq1UDLCyxNn4QUo3lzattyrtxflZHPGv2zK83v225QT4uVQ5Q1i9XbqcH7PiVIMiQE-9ehk8kP88WEiYjGHAhkm1PEFeX5WgcbB-IXkWdwzKuqe27/w549-h250/image.jpg&quot; width=&quot;549&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The use of artificial intelligence (AI) is rapidly growing in many industries and across society. AI systems like machine learning algorithms rely heavily on data to function. As the use of AI expands, protecting the data used to train these systems is becoming increasingly important. Here are some key considerations around securing data for AI:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Anonymize data where possible - Removing personally identifiable information from datasets can help protect privacy. Data should be anonymized unless it is absolutely necessary to have identifying attributes.&lt;/li&gt;&lt;li&gt;Limit data access - Only allow essential personnel to access datasets used for AI model development and training. Put controls in place to monitor who accesses the data and what they do with it.&lt;/li&gt;&lt;li&gt;Encrypt data - Encrypt datasets, especially when storing or transmitting them. This protects the data at rest and in transit. Use strong encryption standards.&lt;/li&gt;&lt;li&gt;Carefully select trustworthy vendors - When partnering with outside organizations on AI projects, perform due diligence to ensure they have strong data security practices and that proper contractual protections are in place.&lt;/li&gt;&lt;li&gt;Track data lineage - Document where datasets originate and how they move through the AI model building pipeline. This supports auditing and helps identify vulnerabilities.&lt;/li&gt;&lt;li&gt;Develop a data deletion plan - Have procedures in place to delete datasets when they are no longer needed for the AI system. This reduces the risk of old data exposure if a breach does occur.&lt;/li&gt;&lt;li&gt;Continuously monitor for suspicious activity - Employ tools to monitor datasets and access patterns in order to detect potential security incidents. Act quickly on any abnormal activity.&lt;/li&gt;&lt;li&gt;Comply with regulations - Stay up to date on evolving data protection laws and regulations applicable to the jurisdictions where the AI system is used. Build compliance into development processes.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Protecting the data that fuels AI is critical as these technologies become more advanced and integrated into our lives. Organizations must make data security a priority when developing and deploying AI systems. With careful controls and governance, data can be secured throughout the AI model lifecycle.&lt;/p&gt;&lt;p&gt;Some examples of data security practices to look for when evaluating potential AI partners:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Encryption - The partner should encrypt data in transit and at rest using industry standard encryption methods like TLS, SSL, and AES-256. This protects against data theft or inadvertent exposure.&lt;/li&gt;&lt;li&gt;Access controls - Strict access controls should be in place to limit access to data to only authorized personnel. Look for role-based access, multi-factor authentication, and automated access reviews.&lt;/li&gt;&lt;li&gt;Anonymization - Data should be anonymized through removal of personal identifiers when possible. Partners should have a data anonymization plan.&lt;/li&gt;&lt;li&gt;Staff training - Partner staff should receive regular data security and privacy training to instill good security habits when handling data. Ask about their training program.&lt;/li&gt;&lt;li&gt;Third-party risk management - Partners should vet any third-party vendors that may access data. Look for comprehensive vendor risk assessment processes.&lt;/li&gt;&lt;li&gt;Data minimization - Partners should only collect, process, and store the minimum data required for the AI system to function optimally. Excessive data creates unnecessary risk.&lt;/li&gt;&lt;li&gt;Hardware controls - Data should be stored on encrypted drives and servers kept in secured facilities with restricted physical access.&lt;/li&gt;&lt;li&gt;Data deletion processes - The partner should have data retention policies and procedures to permanently delete data no longer required for the AI system.&lt;/li&gt;&lt;li&gt;Compliance certification - The partner should comply with relevant data protection laws and be able to provide proof of certifications like ISO 27001 or SOC 2 Type II audits.&lt;/li&gt;&lt;li&gt;Incident response plan - Partners should have an incident response plan that is regularly tested to handle potential data breaches effectively.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/3041504408197411162/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/3041504408197411162' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/3041504408197411162'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/3041504408197411162'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2023/09/protecting-data-used-in-artificial.html' title='Protecting Data Used in Artificial Intelligence'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiSV28ipYr5VJt0XEfv1mLPVtmLHwuxu28Q-uvxPbuwHYVDs86UpbnnPhOucBRWmL6k_Xcq1UDLCyxNn4QUo3lzattyrtxflZHPGv2zK83v225QT4uVQ5Q1i9XbqcH7PiVIMiQE-9ehk8kP88WEiYjGHAhkm1PEFeX5WgcbB-IXkWdwzKuqe27/s72-w549-h250-c/image.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-5239676213756092366</id><published>2023-09-14T20:41:00.010+03:00</published><updated>2023-09-14T20:41:53.382+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ai"/><category scheme="http://www.blogger.com/atom/ns#" term="artificial intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="convergence"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="jorge sebastiao"/><title type='text'>The Convergence of Security and Artificial Intelligence</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz2ebXq8BP29aY1Thc2IluOxTOfWwHG6aLdfgK0GgiVVJSACVyXbGLwLSdvlonETS1eIqFBs40iXQ1DYzE5zZcZVXR622m6f2s4lF-Wh8l3Jvhe3IA_SBCwPWk1FfGA_jTaEWj4TmxQI2yxpIQAnCrzTVpiZ9dNQOE9l7-QMy9LhNSzjTuXOc1/s1920/convergenceAI-security.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1280&quot; data-original-width=&quot;1920&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz2ebXq8BP29aY1Thc2IluOxTOfWwHG6aLdfgK0GgiVVJSACVyXbGLwLSdvlonETS1eIqFBs40iXQ1DYzE5zZcZVXR622m6f2s4lF-Wh8l3Jvhe3IA_SBCwPWk1FfGA_jTaEWj4TmxQI2yxpIQAnCrzTVpiZ9dNQOE9l7-QMy9LhNSzjTuXOc1/w573-h213/convergenceAI-security.jpeg&quot; width=&quot;573&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;In recent years, artificial intelligence (AI) has become integral to cybersecurity defense. As cyber threats have become more frequent and sophisticated, AI and machine learning have stepped in to improve threat detection, analysis, and responsiveness. This joining of AI capabilities with security needs has given rise to a new field known as cybersecurity AI.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;Cybersecurity AI refers to the application of AI algorithms and techniques to automate and enhance cybersecurity operations. It involves using machine learning to extract insights from massive datasets that can reveal attack patterns and vulnerabilities. Cybersecurity AI enables security teams to identify threats and respond to incidents at machine speed.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;Key drivers propelling the adoption of AI in cybersecurity include:&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The volume and complexity of cyberattacks continues to increase exponentially, making AI a necessity to keep pace. AI systems can rapidly process huge amounts of data beyond human capabilities.&lt;/li&gt;&lt;li&gt;A worldwide shortage of skilled cybersecurity professionals has made leveraging AI critical to augment existing teams. AI automates tasks allowing staff to focus on higher value activities.&lt;/li&gt;&lt;li&gt;Legacy cybersecurity tools relying on rules and signatures are unable to detect novel threats. The adaptive intelligence of AI systems enables responding to new types of attacks.&lt;/li&gt;&lt;li&gt;Major developments highlighting the growth of cybersecurity AI include:&lt;/li&gt;&lt;li&gt;Proliferation of AI-powered security products such as user behavior analytics, next-gen antivirus, botnet detection, and more. Venture funding for security AI startups has also surged.&lt;/li&gt;&lt;li&gt;Large investments in cybersecurity AI research and acquisitions by major tech firms like Microsoft, Amazon, IBM, and Google. Partnerships with universities are also rising.&lt;/li&gt;&lt;li&gt;Estimates project the global market for cybersecurity AI will experience massive gains, reaching revenues of $46 billion by 2027.&lt;/li&gt;&lt;/ul&gt;However, as the use of AI for cybersecurity expands, risks require mitigation including:&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Adversarial attacks to trick AI systems into misclassifications that can bypass defenses. Adversarial machine learning is an emerging field to counter this.&lt;/li&gt;&lt;li&gt;Potential biases in algorithms that could lead to inaccurate conclusions and security failures. Ensuring high quality, diverse training data is critical.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;The melding of artificial intelligence capabilities with cybersecurity needs offers tremendous potential to enhance threat prevention and defense. But it also introduces new challenges and vulnerabilities which the industry must actively identify and address. With the proper governance and safeguards, AI can become an invaluable ally in the fight against cybercrime.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;Some examples of AI-powered security products that utilize machine learning and other AI capabilities:&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;u&gt;Anti-malware solutions&lt;/u&gt; - Next-gen antivirus products like CrowdStrike and Cylance use AI to identify new malware samples and detect zero-day threats based on suspicious behaviors.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Fraud detection&lt;/u&gt; - Companies like PayPal and Visa apply AI to spot fraudulent transactions by analyzing user patterns and activities.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;u&gt;Network security &lt;/u&gt;- AI-enabled firewalls like SentinelOne can automatically detect anomalies and block suspicious traffic and cyberattacks in real-time.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Cloud security &lt;/u&gt;- Cloud security platforms from AWS, Microsoft Azure, and Google Cloud use AI algorithms to monitor workloads and user activities to detect compromises.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Email security&lt;/u&gt; - Solutions like Abnormal Security and Vade Secure filter out phishing scams and spam using AI techniques like natural language processing.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;u&gt;Endpoint security &lt;/u&gt;- Tools like Blackberry Cylance protect devices by relying on AI to analyze and block threats and malware.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;u&gt;Security analytics&lt;/u&gt; - Vendors like Splunk and Gurucul leverage machine learning to analyze event data, identify threats, and detect insider risks.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Identity and access management&lt;/u&gt; - Companies like Ping, ForgeRock, and Okta utilize AI for adaptive authentication and detecting account takeover attempts.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Security robots&lt;/u&gt; - Startups like Darktrace and SparkCognition have developed AI-powered security bots that replicate incident response analysts.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;The integration of AI is rapidly redefining the capabilities of cybersecurity products across the board to enhance threat detection, prevention, investigation and response.&lt;/div&gt;&lt;/div&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/5239676213756092366/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/5239676213756092366' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/5239676213756092366'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/5239676213756092366'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2023/09/the-convergence-of-security-and.html' title='The Convergence of Security and Artificial Intelligence'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz2ebXq8BP29aY1Thc2IluOxTOfWwHG6aLdfgK0GgiVVJSACVyXbGLwLSdvlonETS1eIqFBs40iXQ1DYzE5zZcZVXR622m6f2s4lF-Wh8l3Jvhe3IA_SBCwPWk1FfGA_jTaEWj4TmxQI2yxpIQAnCrzTVpiZ9dNQOE9l7-QMy9LhNSzjTuXOc1/s72-w573-h213-c/convergenceAI-security.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-3187930698677081244</id><published>2023-09-14T08:16:00.002+03:00</published><updated>2023-09-14T10:01:08.183+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ai"/><category scheme="http://www.blogger.com/atom/ns#" term="artificial intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="jorge sebastiao"/><category scheme="http://www.blogger.com/atom/ns#" term="smartcity"/><title type='text'>Safe Smart Cities and the Responsible Use of AI</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
  &lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgvzt7twAPIv7zTJf7SK1BeHp1Z2AZ_Q6Iw_sPWj6vrpwEfA36db4Woek_511uXnrEJ5LFOsV55idbmz0Q6W-LOatUNe5gBd-VNb3M91959cCBKXCSBUIUBGkcIkNSkMOKqSoDVyYl0PrlyhVDaCJ3zXU-23fXpKRtxcpU-nLexjtPHaF-XAsHI&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;
    &lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgvzt7twAPIv7zTJf7SK1BeHp1Z2AZ_Q6Iw_sPWj6vrpwEfA36db4Woek_511uXnrEJ5LFOsV55idbmz0Q6W-LOatUNe5gBd-VNb3M91959cCBKXCSBUIUBGkcIkNSkMOKqSoDVyYl0PrlyhVDaCJ3zXU-23fXpKRtxcpU-nLexjtPHaF-XAsHI&quot; width=&quot;400&quot; /&gt;
  &lt;/a&gt;
&lt;/div&gt;&lt;div&gt;As cities around the world adopt more technology and become &quot;smarter&quot;, there are important considerations around safety, ethics, and responsible AI development. Here are some key points on creating safe smart cities with artificial intelligence:&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Privacy and Security&lt;/b&gt; - Smart cities collect vast amounts of data through sensors, cameras, and other monitoring systems. Protecting the privacy of citizens and securing this data against cyberattacks must be a top priority. Strict data governance policies need to be in place.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Avoiding Bias&lt;/b&gt; - AI algorithms used in smart cities must be thoroughly tested to avoid racial, gender, or other biases. Diversity and inclusion should be emphasized in AI development teams. Ongoing audits of algorithms are needed.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Transparency&lt;/b&gt; - There should be transparency around how AI systems work in smart cities. Citizens should be informed on what data is being collected and how it is used. Open communication builds public trust.&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Human Oversight&lt;/b&gt; - Final decisions should always have human oversight. AI may guide and suggest, but human city employees need to validate recommendations and be accountable. This ensures citizen rights are protected.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Serving Citizens&lt;/b&gt; - The focus should be on using AI to serve citizens, not replace them. The technology should aim to improve quality of life, transportation, public services, and opportunities for all.&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Ethics Review Boards&lt;/b&gt; - Smart cities need ethics review boards to assess proposals for new AI systems. This ensures the beneficial use of AI and minimizes potential risks. External ethical oversight adds protection.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;By making safety, ethics and responsible development core pillars of their smart city strategies, civic leaders can harness the power of AI while building public trust. With careful planning, smart cities can demonstrate the huge potential of artificial intelligence for improving life in both big and small communities.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Additionally on responsible AI use within smart cities:&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;u&gt;Regular System Evaluations&lt;/u&gt; - There should be recurring evaluations of AI systems used in smart cities to assess for accuracy, fairness, and unintended consequences. Models need to be retrained and updated frequently as conditions change.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Fail-Safes and Overrides&lt;/u&gt; - Engineers should build in fail-safes and manual overrides for AI systems in case of unexpected failures or emergencies. Humans need the ability to shut down automated services if danger arises.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Start Small &lt;/u&gt;- Cities should start with small-scale pilot projects to test AI systems before wide deployment. Limited pilots allow for controlled testing and improvements in real urban environments.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Community Input&lt;/u&gt; - Inclusive community input, surveys and workshops should inform the design of AI systems. Diverse viewpoints lead to more robust and ethical technology.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Protecting Jobs&lt;/u&gt; - AI should be used to augment and aid human workers, not replace them. Invest in retraining programs to transition displaced workers into new roles.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;u&gt;Open Standards&lt;/u&gt; - Smart cities should follow open standards for data infrastructure and AI systems when possible. This avoids locking cities into proprietary vendor solutions.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Learning from Mistakes&lt;/u&gt; - When AI system failures occur, learn from them. Analyze what went wrong, fix it, and share lessons with other cities. Being open about mishaps makes everyone safer.&lt;/li&gt;&lt;li&gt;&lt;u&gt;Prioritizing Equity&lt;/u&gt; - Apply AI to promote equity and accessibility for disadvantaged communities. Make inclusion a core principle, not an afterthought.&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;u&gt;Cooperating Regionally &lt;/u&gt;- Cities should cooperate regionally and share best practices on ethical AI development. Aligning strategies with neighboring cities fosters large-scale responsibility.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/3187930698677081244/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/3187930698677081244' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/3187930698677081244'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/3187930698677081244'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2023/09/safe-smart-cities-and-responsible-use.html' title='Safe Smart Cities and the Responsible Use of AI'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEgvzt7twAPIv7zTJf7SK1BeHp1Z2AZ_Q6Iw_sPWj6vrpwEfA36db4Woek_511uXnrEJ5LFOsV55idbmz0Q6W-LOatUNe5gBd-VNb3M91959cCBKXCSBUIUBGkcIkNSkMOKqSoDVyYl0PrlyhVDaCJ3zXU-23fXpKRtxcpU-nLexjtPHaF-XAsHI=s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-1872283801916872670</id><published>2023-09-13T02:17:00.000+03:00</published><updated>2023-09-13T02:17:03.076+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="artificial intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="jorge sebastiao"/><category scheme="http://www.blogger.com/atom/ns#" term="risk"/><title type='text'>The Rising Risks of AI</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXzL82rBJUfXwqI5s4an4G9_13kLSPvaIz5kHPM9fgM5tni5Xa3OBSvipRe1vJL2fb89Q1Nol5qmYljvQQE1C6Fu5hkjAwMp2IYUmsX4TKr5sCQzJhOVF-MDEvj1smg41SJGvznpCU5bX2FHJ_0O1El3iDiVOh_G_dtp1ty9F_Ma_VQRqmGpl4/s710/bigrisksAI.webp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;473&quot; data-original-width=&quot;710&quot; height=&quot;244&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXzL82rBJUfXwqI5s4an4G9_13kLSPvaIz5kHPM9fgM5tni5Xa3OBSvipRe1vJL2fb89Q1Nol5qmYljvQQE1C6Fu5hkjAwMp2IYUmsX4TKr5sCQzJhOVF-MDEvj1smg41SJGvznpCU5bX2FHJ_0O1El3iDiVOh_G_dtp1ty9F_Ma_VQRqmGpl4/w367-h244/bigrisksAI.webp&quot; width=&quot;367&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Artificial intelligence has made tremendous advances in recent years and is being applied in more and more areas of our lives. However, as AI systems grow more autonomous and capable, it brings with it new risks that researchers are working to address. Some of the major risks that have been identified include:&lt;/p&gt;&lt;p&gt;&lt;b&gt;Loss of Control&lt;/b&gt;&lt;/p&gt;&lt;p&gt;As AI systems become more intelligent and complex, it may become harder for humans to fully understand, predict, and control their behavior. Advanced AI could potentially behave in unexpected or harmful ways if not properly constrained by its programming and training. Ensuring AI systems remain helpful, harmless, and honest is an ongoing challenge.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Job Displacement&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Many jobs could potentially be automated by AI in the coming decades as machines gain abilities like perception, reasoning, and physical dexterity. While AI will likely create new types of jobs, it may also displace many existing occupations. This could have substantial economic and societal impacts if not properly managed through retraining programs and other mitigation strategies.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Bias and unfairness&lt;/b&gt;&lt;/p&gt;&lt;p&gt;If machine learning algorithms are trained on biased datasets, they can easily learn and reflect the same biases. This could negatively impact certain groups and exacerbate issues of unequal treatment. Researchers are working on techniques like algorithmic fairness to address issues of bias in AI systems, but more progress is still needed.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Misuse of Technologies&lt;/b&gt;&lt;/p&gt;&lt;p&gt;As with any powerful technology, there is a risk that AI could potentially be misused for malicious purposes like autonomous weapons, mass surveillance, or advanced cybercrime. Strengthening norms and developing international agreements around AI development and applications may help curb potential harms.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Privacy and Security Issues&lt;/b&gt;&lt;/p&gt;&lt;p&gt;As more personal and private data is collected to train AI algorithms, it raises serious privacy concerns if that data is exposed through a security breach or misused without consent. Stringent data handling practices and regulations are required to build trust in AI and protect individuals.&lt;/p&gt;&lt;p&gt;These risks highlight the importance of ongoing research into how to ensure the safe and responsible development of advanced AI. With proactive management and oversight, the benefits AI offers humanity can be realized while avoiding potential downsides. Continued progress requires cooperation across industry, government, and research institutions worldwide.&lt;/p&gt;&lt;p&gt;There are some further examples of AI technologies that could potentially be misused:&lt;/p&gt;&lt;p&gt;&lt;u&gt;Deepfake technology&lt;/u&gt; - AI-generated fake videos, images and audio that look realistic. Could be used to spread disinformation or fake news.&lt;/p&gt;&lt;p&gt;&lt;u&gt;Facial recognition&lt;/u&gt; - While used for security purposes, facial recognition data could potentially be used for mass surveillance without consent.&lt;/p&gt;&lt;p&gt;&lt;u&gt;Automated propaganda&lt;/u&gt; - AI may enable hyper-personalized misinformation at scale, targeting individuals based on their interests and beliefs.&lt;/p&gt;&lt;p&gt;&lt;u&gt;Lethal autonomous weapons&lt;/u&gt; - AI powered weapons like drones or missiles that can engage targets without meaningful human control raise concerns about accountability for life and death decisions.&lt;/p&gt;&lt;p&gt;&lt;u&gt;AI assistants&lt;/u&gt; - Assistants like voice assistants or chatbots could potentially be hacked or misused to spread misleading information to users or spy on private conversations.&lt;/p&gt;&lt;p&gt;&lt;u&gt;Predictive policing&lt;/u&gt; - If inaccurate or unfair, predictive policing systems using AI could negatively profile certain groups and exacerbate issues in the criminal justice system.&lt;/p&gt;&lt;p&gt;&lt;u&gt;Deepfakes for cybercrime&lt;/u&gt; - Sophisticated deepfakes may enable new types of social engineering attacks or scams by generating fake audio or video of public figures.&lt;/p&gt;&lt;p&gt;&lt;u&gt;AI generation of child sexual abuse material &lt;/u&gt;- There are concerns AI could potentially be used to generate entirely fake but realistic images, undermining detection methods.&lt;/p&gt;&lt;p&gt;So in summary, any technology involving personal data, autonomy over physical systems, or advanced generation capabilities carries risks if misapplied or abused by malicious actors. Oversight is important to mitigate harm&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/1872283801916872670/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/1872283801916872670' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/1872283801916872670'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/1872283801916872670'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2023/09/the-rising-risks-of-ai.html' title='The Rising Risks of AI'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXzL82rBJUfXwqI5s4an4G9_13kLSPvaIz5kHPM9fgM5tni5Xa3OBSvipRe1vJL2fb89Q1Nol5qmYljvQQE1C6Fu5hkjAwMp2IYUmsX4TKr5sCQzJhOVF-MDEvj1smg41SJGvznpCU5bX2FHJ_0O1El3iDiVOh_G_dtp1ty9F_Ma_VQRqmGpl4/s72-w367-h244-c/bigrisksAI.webp" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-7680716256971382454</id><published>2023-09-12T10:47:00.004+03:00</published><updated>2023-09-21T09:59:07.376+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Advanced Persistent Threat"/><category scheme="http://www.blogger.com/atom/ns#" term="artificial intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="authentication"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="Incident Response"/><category scheme="http://www.blogger.com/atom/ns#" term="jorge sebastiao"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="network security"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability"/><title type='text'>Applications of Artificial Intelligence in Cyber Security</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4Wf3VLiV2PqHSc9qvEsH0GvMqvJhj6zYtg5SjsLMhpmh3ZCT0HuLxBQSNKaBZXNY8NL9OsC1SnkFro89t56KXEwCtu0sb3WVcioQHf0ytOKgPEdusIxafAFk0borM0NeF-xXqIo9w0lIG94R3ObwsP1-4l7xZPOCrod3mg5keMm-PTt9yBJYZ/s335/cybersecurity-AI.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;151&quot; data-original-width=&quot;335&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4Wf3VLiV2PqHSc9qvEsH0GvMqvJhj6zYtg5SjsLMhpmh3ZCT0HuLxBQSNKaBZXNY8NL9OsC1SnkFro89t56KXEwCtu0sb3WVcioQHf0ytOKgPEdusIxafAFk0borM0NeF-xXqIo9w0lIG94R3ObwsP1-4l7xZPOCrod3mg5keMm-PTt9yBJYZ/w657-h266/cybersecurity-AI.jpeg&quot; width=&quot;657&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Artificial intelligence (AI) is transforming the landscape of cybersecurity (CyberSec). AI and machine learning algorithms allow cybersecurity systems to detect, analyze, and respond to threats in increasingly sophisticated ways that replicate and even improve upon human intelligence. Here are some of the key ways AI is being applied in cybersecurity:&lt;/p&gt;&lt;p&gt;&lt;b&gt;Malware Detection&lt;/b&gt;&lt;/p&gt;&lt;p&gt;AI algorithms can be trained to detect new malware variants based on certain signature features. AI systems can analyze code much faster than humans and identify similarities to known malicious code. Once trained on a large dataset of malware samples, AI systems can flag new file samples that contain suspect code with high accuracy. This allows quick identification of zero-day malware threats.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Network Intrusion Detection&lt;/b&gt;&lt;/p&gt;&lt;p&gt;By analyzing patterns in network traffic data, AI systems can spot anomalous activity that could indicate cyberattacks such as denial-of-service attacks. The algorithms can detect deviations from normal traffic baselines that signal intrusions. AI-powered network monitoring tools can continuously analyze traffic in real-time and generate alerts for potential threats.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Fraud Detection&lt;/b&gt;&lt;/p&gt;&lt;p&gt;AI techniques are being used to detect various types of cyber fraud such as financial fraud, identity fraud, and insurance fraud. AI systems can process vast amounts of customer data and identify fraudulent behaviors based on patterns. The self-learning capabilities of AI algorithms also allow fraud detection systems to continuously improve over time as new fraud tactics emerge.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Security Operations and Incident Response&lt;/b&gt;&lt;/p&gt;&lt;p&gt;AI algorithms help prioritize security alerts and events for human analysts. This allows focusing on the most critical threats first. AI-powered virtual security assistants can take over manual tasks in the security operations center to allow staff to work on higher value activities. AI also helps gather data from multiple sources during incident response to identify affected systems, determine entry points, and suggest containment measures.&lt;/p&gt;&lt;p&gt;&lt;b&gt;User and Entity Behavior Analytics&lt;/b&gt;&lt;/p&gt;&lt;p&gt;By applying AI techniques to analyze patterns in user activity data and network logs, anomalous behaviors such as compromised credentials or malicious insiders can be detected. AI models can generate a baseline profile for each user and device. Any activities deviating from these profiles raise alerts, allowing early detection of account takeovers and insider threats.&lt;/p&gt;&lt;p&gt;The rapid pace of advancement in AI/ML algorithms, along with the rising sophistication of cyberattacks, is driving increased adoption of AI in cyber defense. Going forward, AI is expected to become an integral component of all layers of cybersecurity architecture.&lt;/p&gt;&lt;p&gt;AI can be further applied in cybersecurity in several ways:&lt;/p&gt;&lt;p&gt;&lt;b&gt;Automated threat intelligence and data correlation&lt;/b&gt;&lt;/p&gt;&lt;p&gt;AI systems can continuously gather threat data from multiple sources like dark web forums, hacker chatter, security advisories, etc. The data is correlated using machine learning to identify new threats, bad actors, and emerging attack patterns. This allows proactive defense measures.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Secure authentication&lt;/b&gt;&lt;/p&gt;&lt;p&gt;AI is being used to go beyond passwords to secure user authentication. AI-powered systems can continuously analyze user behavior patterns and develop unique behavior profiles. Users are authenticated by matching current activity to these unique profiles. AI makes authentication adaptive and harder to spoof.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Vulnerability assessment and penetration testing&lt;/b&gt;&lt;/p&gt;&lt;p&gt;AI tools can autonomously scan systems and networks for vulnerabilities, simulate attacks to test defenses, and intelligently bypass security in penetration tests. This provides faster and more comprehensive evaluation of security posture.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Defending against social engineering&lt;/b&gt;&lt;/p&gt;&lt;p&gt;AI can analyze human communication like emails to detect language patterns and other signs of deception. This can identify targeted phishing emails and other social engineering attacks designed to manipulate end users.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Securing IoT environments&lt;/b&gt;&lt;/p&gt;&lt;p&gt;The growth of IoT presents new security challenges. AI systems can securely onboard IoT devices, monitor them for anomalous behavior indicative of hijacking, and continually assess them for vulnerabilities.&lt;/p&gt;&lt;p&gt;Overall, AI is transforming cybersecurity by making detection faster and smarter while allowing organizations to proactively anticipate new threats. It is a crucial tool for building robust cyber defenses of the future as threats continue to evolve.&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/7680716256971382454/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/7680716256971382454' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/7680716256971382454'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/7680716256971382454'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2023/09/applications-of-artificial-intelligence.html' title='Applications of Artificial Intelligence in Cyber Security'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4Wf3VLiV2PqHSc9qvEsH0GvMqvJhj6zYtg5SjsLMhpmh3ZCT0HuLxBQSNKaBZXNY8NL9OsC1SnkFro89t56KXEwCtu0sb3WVcioQHf0ytOKgPEdusIxafAFk0borM0NeF-xXqIo9w0lIG94R3ObwsP1-4l7xZPOCrod3mg5keMm-PTt9yBJYZ/s72-w657-h266-c/cybersecurity-AI.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-4090580544158683797</id><published>2023-09-11T10:27:00.002+03:00</published><updated>2023-09-21T09:58:54.214+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="backup"/><category scheme="http://www.blogger.com/atom/ns#" term="blockchain"/><category scheme="http://www.blogger.com/atom/ns#" term="cold storage"/><category scheme="http://www.blogger.com/atom/ns#" term="crypto"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="digital wallets"/><category scheme="http://www.blogger.com/atom/ns#" term="jorge sebastiao"/><category scheme="http://www.blogger.com/atom/ns#" term="phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="private keys"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerabilities"/><title type='text'>Blockchain and Cybersecurity: Two Sides of the Same Coin</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi72_8j0G2TH6MCDgREIDM7YvEaNBHOabL1dXDBv-2L_AUG1x1MpKHOy-wMz8Ng7Ity2w7XVD2PtAdjDRUMoYZppkYQZIQQs-i0FwmoPneE6jzEhoRXusqQX7YSWTabwGLFN8_DAenRyJq9F5-P0ztBtKUe85bZNsLARKV51xd8iCNHd6ExAL1H/s1019/blockchain%20cybersecurity.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;408&quot; data-original-width=&quot;1019&quot; height=&quot;236&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi72_8j0G2TH6MCDgREIDM7YvEaNBHOabL1dXDBv-2L_AUG1x1MpKHOy-wMz8Ng7Ity2w7XVD2PtAdjDRUMoYZppkYQZIQQs-i0FwmoPneE6jzEhoRXusqQX7YSWTabwGLFN8_DAenRyJq9F5-P0ztBtKUe85bZNsLARKV51xd8iCNHd6ExAL1H/w634-h236/blockchain%20cybersecurity.jpg&quot; width=&quot;634&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Blockchain technology has gained immense popularity in recent years due to its potential to revolutionize many industries. However, for blockchains to fulfill their promise, robust cybersecurity measures are essential. This article explores the close relationship between blockchain and cybersecurity.&lt;/p&gt;&lt;p&gt;What is Blockchain?&lt;/p&gt;&lt;p&gt;A blockchain is a distributed ledger technology that allows transactions to be recorded and verified without the need for a central authority. Blockchains are decentralized networks where each participant has a copy of the ledger. When a new transaction occurs, it is validated by the network participants and added to the ledger through a consensus mechanism.&lt;/p&gt;&lt;p&gt;Some key properties of blockchains are:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Decentralization - No single entity controls the network&lt;/li&gt;&lt;li&gt;Transparency - All participants can view the transactions&lt;/li&gt;&lt;li&gt;Immutability - Once data is added, it is extremely difficult to alter&lt;/li&gt;&lt;li&gt;Security - Cryptographic mechanisms secure the network&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;These features make blockchain useful for cryptocurrencies, supply chain tracking, healthcare records, and more.&lt;/p&gt;&lt;p&gt;Cybersecurity Risks for Blockchains&lt;/p&gt;&lt;p&gt;While blockchains are secure by design, they do face cybersecurity threats just like any other technology system connected to the internet. Some risks include:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Malicious actors hijacking the consensus mechanism if they gain over 50% control of the network. This &quot;51% attack&quot; allows writing fraudulent transactions.&lt;/li&gt;&lt;li&gt;Bugs in blockchain code or wallets can lead to theft or loss of funds.&lt;/li&gt;&lt;li&gt;Phishing attacks to steal users&#39; private keys used to access blockchain assets.&lt;/li&gt;&lt;li&gt;Denial-of-service attacks on nodes to disrupt network availability.&lt;/li&gt;&lt;li&gt;Quantum computing could crack the cryptographic foundations of certain blockchains.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Importance of Cybersecurity for Blockchain&lt;/p&gt;&lt;p&gt;Robust cybersecurity is crucial for realizing the potential of blockchain technology. Some reasons it matters:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Trust: Blockchains must be trustworthy and resilient to attacks to gain adoption. Being hacked would damage their reputation.&lt;/li&gt;&lt;li&gt;Value protection: Billions of dollars of value are stored on public blockchains. Hacks could result in huge financial losses.&lt;/li&gt;&lt;li&gt;Reliability: If blockchains frequently go offline due to cyberattacks, institutions won&#39;t rely on them for mission-critical functions.&lt;/li&gt;&lt;li&gt;Compliance: Blockchains holding sensitive data like health records must comply with cybersecurity regulations.&lt;/li&gt;&lt;li&gt;Crime prevention: Better security reduces appeal of using blockchains for illicit activities like money laundering.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Steps to Enhance Blockchain Security&lt;/p&gt;&lt;p&gt;Ongoing efforts to strengthen blockchain cybersecurity include:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Improving consensus protocols and encryption to prevent 51% attacks.&lt;/li&gt;&lt;li&gt;Formal verification of smart contract code to reduce bugs.&lt;/li&gt;&lt;li&gt;Developing quantum-resistant blockchains to withstand future threats.&lt;/li&gt;&lt;li&gt;Security audits of blockchain projects before launch.&lt;/li&gt;&lt;li&gt;Best practice guides for secure blockchain architecture and development.&lt;/li&gt;&lt;li&gt;User education on threats like phishing and properly securing private keys.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The success of revolutionary technologies like blockchain heavily depends on building security every step of the way. With strong cybersecurity foundations, blockchains can transform society for the better.&lt;/p&gt;&lt;p&gt;Here are some tips users can follow to educate themselves on blockchain security threats like phishing and properly securing private keys:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Learn to identify phishing attempts. Phishing involves emails, fake websites, or texts pretending to be from a legitimate company to trick users into revealing private information. Be suspicious of unexpected messages asking you to click links or verify account details.&lt;/li&gt;&lt;li&gt;Never reveal your private keys. Private keys are like the password to your blockchain assets. Never share them with anyone or enter them on unfamiliar websites. Legitimate companies will never ask for your private key.&lt;/li&gt;&lt;li&gt;Use hardware wallets. Devices like Trezor or Ledger offer offline storage for private keys. This protects them even if your computer is compromised by malware.&lt;/li&gt;&lt;li&gt;Set up two-factor authentication on exchanges. Adding an extra step like an SMS code or authenticator app prevents attackers from accessing your exchange account even if they steal your password.&lt;/li&gt;&lt;li&gt;Backup your private keys. Save an encrypted copy of your private keys in case you lose access to your primary wallet. Store the backup somewhere secure like a safe or password manager.&lt;/li&gt;&lt;li&gt;Keep software updated. Always run the latest security patches on wallets and apps to fix vulnerabilities. Updates often include critical security fixes.&lt;/li&gt;&lt;li&gt;Beware of fake wallet apps. Only download wallets from the official app store for your platform. Fake wallet apps are a common scam trick.&lt;/li&gt;&lt;li&gt;Learn to identify fake websites. Check the URL carefully and look for the security lock icon. Fake sites imitate real ones to steal your information.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Taking the time to learn best practices goes a long way in keeping your blockchain assets safe from theft.&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/4090580544158683797/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/4090580544158683797' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/4090580544158683797'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/4090580544158683797'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2023/09/blockchain-and-cybersecurity-two-sides.html' title='Blockchain and Cybersecurity: Two Sides of the Same Coin'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi72_8j0G2TH6MCDgREIDM7YvEaNBHOabL1dXDBv-2L_AUG1x1MpKHOy-wMz8Ng7Ity2w7XVD2PtAdjDRUMoYZppkYQZIQQs-i0FwmoPneE6jzEhoRXusqQX7YSWTabwGLFN8_DAenRyJq9F5-P0ztBtKUe85bZNsLARKV51xd8iCNHd6ExAL1H/s72-w634-h236-c/blockchain%20cybersecurity.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-8600502432915287422</id><published>2023-09-10T22:58:00.003+03:00</published><updated>2023-09-21T09:58:36.823+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ai"/><category scheme="http://www.blogger.com/atom/ns#" term="artificial intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="critical infrastructure"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="jorge sebastiao"/><title type='text'> The Importance of Cybersecurity in Artificial Intelligence</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjxKpPDWcGiyB9pb8q8MYWc-UULrpuEFzjnmthzOD_wog1JYc_DIuQRZGyburYR507OJeLmIc2Oq_uxaCr75G-Y2nWQcYkX4Fgzlj7QtdkBS6rHxSiD4NIFc1kSX9dfPcf63NzClbr6lMsTU3pmnAn1kcrBFM10oFvekmKWcT6evNQEBkF75Xl/s348/ai-cybersecurity.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;145&quot; data-original-width=&quot;348&quot; height=&quot;253&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjxKpPDWcGiyB9pb8q8MYWc-UULrpuEFzjnmthzOD_wog1JYc_DIuQRZGyburYR507OJeLmIc2Oq_uxaCr75G-Y2nWQcYkX4Fgzlj7QtdkBS6rHxSiD4NIFc1kSX9dfPcf63NzClbr6lMsTU3pmnAn1kcrBFM10oFvekmKWcT6evNQEBkF75Xl/w607-h253/ai-cybersecurity.jpeg&quot; width=&quot;607&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;As artificial intelligence (AI) technology becomes more advanced and capable, it is being integrated into more applications and systems. AI is being used to power self-driving cars, enhance medical diagnostics, improve education tools, and automate various business processes. However, with the rise of AI comes new cybersecurity risks that must be addressed.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;AI systems rely on vast amounts of data for learning and improving over time. This data contains valuable and private information that could be exploited if hacked or leaked. Personal details, medical records, financial information, and more are all at risk if AI applications and the data they use are not sufficiently protected. Without proper cybersecurity measures, bad actors could potentially access and misuse the data powering AI in harmful ways.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;AI is now being deployed into critical infrastructure like transportation networks, utilities, and healthcare facilities, it also introduces new attack vectors for hackers to potentially disrupt or sabotage vital systems. Self-driving vehicles could be coerced into dangerous maneuvers, power grids could experience outages, and medical devices could be impaired. Ensuring the security of AI technologies integrated into societally important domains is crucial for public safety.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Beyond data privacy and infrastructure risks, there is also the danger of &quot;adversarial attacks&quot; against AI models themselves. By introducing specially crafted corruptive inputs, a machine learning model&#39;s decisions could potentially be manipulated without its owners&#39; knowledge.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;For example, an AI assistant could be tricked into providing misleading or offensive responses. Image recognition algorithms may fail to identify certain objects if shown adversarial examples. Proper testing and protections are needed to make AI systems robust against such covert attacks.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;As AI capabilities evolve at a rapid pace, so too must cybersecurity adapt to new challenges. Building security measures directly into AI technologies from their inception, through techniques like privacy-preserving data techniques and model integrity verification, will be key. Ongoing monitoring and patching will also remain important as threats emerge. With a comprehensive, layered approach to AI cybersecurity, the enormous potential benefits of this transformative technology can be safely realized. Neglecting security could undermine public trust in AI and potentially even put lives at risk - making cyber protections a top priority for the responsible development of artificial intelligence.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Additional points about the importance of cybersecurity in artificial intelligence:&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;As AI models become more complex and powerful, they also become more vulnerable to manipulation through adversarial attacks. Defending against these threats requires constant research into new attack vectors and developing appropriate model protections. Without adequate security testing, there is a risk of real-world harms from compromised AI systems.&lt;/li&gt;&lt;li&gt;Data is the fuel that powers AI, and securing huge datasets containing sensitive personal information is inherently challenging. Strong access controls, encryption, and auditability are crucial but complex to implement at scale. Any data leaks could seriously damage public trust in AI development.&lt;/li&gt;&lt;li&gt;As AI is integrated into critical national infrastructure and defense technologies, it increases the strategic value of compromising these systems for adversaries. Nation-state hacking attempts on AI data and technologies will likely become a growing concern.&lt;/li&gt;&lt;li&gt;The opacity of some AI models makes it difficult to fully understandhow they could potentially be attacked or manipulated. Achieving high levels of algorithmic transparency through techniques like model explainability will be important both for security and maintaining oversight.&lt;/li&gt;&lt;li&gt;Ensuring AI systems can safely and ethically cooperate with humans requires considering how cyberattacks might disrupt human-AI collaboration or decision making processes. Integrating the human perspective into AI security methodology is still an emerging area of research.&lt;/li&gt;&lt;li&gt;Establishing global security best practices and international cooperation on AI cyber defense will grow increasingly vital as AI is applied worldwide. Lack of coordination could undermine collective protection efforts.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;So in many ways, AI both depends upon strong cybersecurity and simultaneously introduces entirely new security challenges that will evolve alongside advancing technology. A multifaceted, proactive approach is needed.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/8600502432915287422/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/8600502432915287422' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/8600502432915287422'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/8600502432915287422'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2023/09/the-importance-of-cybersecurity-in.html' title=' The Importance of Cybersecurity in Artificial Intelligence'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjxKpPDWcGiyB9pb8q8MYWc-UULrpuEFzjnmthzOD_wog1JYc_DIuQRZGyburYR507OJeLmIc2Oq_uxaCr75G-Y2nWQcYkX4Fgzlj7QtdkBS6rHxSiD4NIFc1kSX9dfPcf63NzClbr6lMsTU3pmnAn1kcrBFM10oFvekmKWcT6evNQEBkF75Xl/s72-w607-h253-c/ai-cybersecurity.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-6316220767113359742</id><published>2023-08-31T10:13:00.001+03:00</published><updated>2023-09-18T10:15:30.222+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="security incidents"/><title type='text'>The biggest cyber security incidents in August 2023</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;h1 style=&quot;background-color: white; box-sizing: border-box; font-family: Raleway, sans-serif; font-size: 2.2em; letter-spacing: -1px; line-height: 1.2; margin-bottom: 0.5rem; margin-top: 0px; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.cshub.com/attacks/news/the-biggest-cyber-security-incidents-in-august-2023&quot; target=&quot;_blank&quot;&gt;The biggest cyber security incidents in August 2023&lt;/a&gt;&lt;/h1&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicwBInFZv04qRBmlQOhsAcaM59vhtR-BTRuJ7zGtWUxzUraLKn0ZyIfhkzy4qxhDhP44Lz5TGkVbG6onxtxQ032GCjut29aE7OpFMR1XPSBHksJApemoDKbPFG4h1Ecu-iEsEjAALXhab6yDvjnCGgpj3WalbBZE14Zu1JTnOq3ClhTgGwU8RW/s350/august_23_data_breachesPFUWjXEmnSXo7j2E5lMZq3EDVQxyUHhzVFNQxtYY.webp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;251&quot; data-original-width=&quot;350&quot; height=&quot;378&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicwBInFZv04qRBmlQOhsAcaM59vhtR-BTRuJ7zGtWUxzUraLKn0ZyIfhkzy4qxhDhP44Lz5TGkVbG6onxtxQ032GCjut29aE7OpFMR1XPSBHksJApemoDKbPFG4h1Ecu-iEsEjAALXhab6yDvjnCGgpj3WalbBZE14Zu1JTnOq3ClhTgGwU8RW/w528-h378/august_23_data_breachesPFUWjXEmnSXo7j2E5lMZq3EDVQxyUHhzVFNQxtYY.webp&quot; width=&quot;528&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/6316220767113359742/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/6316220767113359742' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/6316220767113359742'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/6316220767113359742'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2023/08/the-biggest-cyber-security-incidents-in.html' title='The biggest cyber security incidents in August 2023'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicwBInFZv04qRBmlQOhsAcaM59vhtR-BTRuJ7zGtWUxzUraLKn0ZyIfhkzy4qxhDhP44Lz5TGkVbG6onxtxQ032GCjut29aE7OpFMR1XPSBHksJApemoDKbPFG4h1Ecu-iEsEjAALXhab6yDvjnCGgpj3WalbBZE14Zu1JTnOq3ClhTgGwU8RW/s72-w528-h378-c/august_23_data_breachesPFUWjXEmnSXo7j2E5lMZq3EDVQxyUHhzVFNQxtYY.webp" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-5893054426244349338</id><published>2023-07-31T14:04:00.007+03:00</published><updated>2023-09-12T14:05:34.220+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2023"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><title type='text'>Cybersecurity in 2023: Top Stories (So Far)</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;h1 itemprop=&quot;headline&quot; style=&quot;box-sizing: inherit; cursor: default; font-family: Verdana, Geneva, sans-serif; font-size: 2.8125rem; line-height: 57px; margin-block: 0px; margin: 6px 0px 30px; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.itprotoday.com/security/cybersecurity-2023-top-stories-so-far&quot; target=&quot;_blank&quot;&gt;Cybersecurity in 2023: Top Stories (So Far)&lt;/a&gt;&lt;/h1&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-hyeoOXvKEHxqBducTz2egduGYdiMv8dq6FgkkYUyG_dvSvQaQeqZYSo83DH-fHZpeha1KzOq1cikvMHJT1wuvH-dOCtzZJK0kWE3FQQfnWhrsFlyYL8FtANsiN8h5u90OLfGpJhrCd1GFuGP4HBmmo4dh876wy9RrrUVbXPIY98iHlzSs89_/s1540/holographic%20neon%20padlock%20icon%20in%20blue%202.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;800&quot; data-original-width=&quot;1540&quot; height=&quot;166&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-hyeoOXvKEHxqBducTz2egduGYdiMv8dq6FgkkYUyG_dvSvQaQeqZYSo83DH-fHZpeha1KzOq1cikvMHJT1wuvH-dOCtzZJK0kWE3FQQfnWhrsFlyYL8FtANsiN8h5u90OLfGpJhrCd1GFuGP4HBmmo4dh876wy9RrrUVbXPIY98iHlzSs89_/w674-h166/holographic%20neon%20padlock%20icon%20in%20blue%202.jpg&quot; width=&quot;674&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/5893054426244349338/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/5893054426244349338' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/5893054426244349338'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/5893054426244349338'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2023/07/cybersecurity-in-2023-top-stories-so-far.html' title='Cybersecurity in 2023: Top Stories (So Far)'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-hyeoOXvKEHxqBducTz2egduGYdiMv8dq6FgkkYUyG_dvSvQaQeqZYSo83DH-fHZpeha1KzOq1cikvMHJT1wuvH-dOCtzZJK0kWE3FQQfnWhrsFlyYL8FtANsiN8h5u90OLfGpJhrCd1GFuGP4HBmmo4dh876wy9RrrUVbXPIY98iHlzSs89_/s72-w674-h166-c/holographic%20neon%20padlock%20icon%20in%20blue%202.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-1418285708165822563</id><published>2022-12-31T13:57:00.007+03:00</published><updated>2023-09-14T10:04:04.765+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2022"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><title type='text'>Top 10 cyber security stories of 2022</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;h1 class=&quot;main-article-title&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: 0px 50%; background-repeat: initial; background-size: initial; color: #323232; font-family: Arial, sans-serif; font-size: 42px; letter-spacing: -0.02em; line-height: 1.1em; margin: 30px 0px 25px; min-height: 0px; padding: 0px 40px; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.computerweekly.com/news/252528239/Top-10-cyber-security-stories-of-2022&quot; target=&quot;_blank&quot;&gt;Top 10 cyber security stories of 2022&lt;/a&gt;&lt;/h1&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfqhsX-pTkUQDyZP8jSxgUHgLN7uLk5UzCeVBF9ygXh7U5C3eKgRQ0x67hq4XG1Jq-AcRPG9tvvC9Rxzd8wHT2kPTi2NRHlRlYjtkXHNAiosUWvlLjy_Lp0LpXGv01KqejM17-bOaCgjm-iQzOU14FGjUvalr72KAJBGogj1sxlhhtyR8iSFYA/s1200/data-privacy-city-adobe.jpeg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;400&quot; data-original-width=&quot;1200&quot; height=&quot;216&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfqhsX-pTkUQDyZP8jSxgUHgLN7uLk5UzCeVBF9ygXh7U5C3eKgRQ0x67hq4XG1Jq-AcRPG9tvvC9Rxzd8wHT2kPTi2NRHlRlYjtkXHNAiosUWvlLjy_Lp0LpXGv01KqejM17-bOaCgjm-iQzOU14FGjUvalr72KAJBGogj1sxlhhtyR8iSFYA/w647-h216/data-privacy-city-adobe.jpeg&quot; width=&quot;647&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/1418285708165822563/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/1418285708165822563' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/1418285708165822563'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/1418285708165822563'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2022/12/top-10-cyber-security-stories-of-2022.html' title='Top 10 cyber security stories of 2022'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfqhsX-pTkUQDyZP8jSxgUHgLN7uLk5UzCeVBF9ygXh7U5C3eKgRQ0x67hq4XG1Jq-AcRPG9tvvC9Rxzd8wHT2kPTi2NRHlRlYjtkXHNAiosUWvlLjy_Lp0LpXGv01KqejM17-bOaCgjm-iQzOU14FGjUvalr72KAJBGogj1sxlhhtyR8iSFYA/s72-w647-h216-c/data-privacy-city-adobe.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-5272664941242537302</id><published>2022-02-01T13:50:00.005+03:00</published><updated>2023-09-14T10:05:53.157+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2021"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><title type='text'>Top Ten Cyberattacks of 2020-2021</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;h1 class=&quot;entry-title&quot; style=&quot;background-color: #f7f7f7; clear: both; color: #333333; font-family: Roboto, Helvetica, Arial, Verdana, sans-serif; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size: 30px; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variation-settings: normal; line-height: 40px; margin: 0px; padding: 0px; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.eccu.edu/blog/cybersecurity/top-ten-cyberattacks-of-2020-2021/&quot; target=&quot;_blank&quot;&gt;Top Ten Cyberattacks of 2020-2021&lt;/a&gt;&lt;/h1&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDePTC0FZ4Ors_Oleg9sLG3Ne1UJ3ZJIKncjky5nKz1ZzPe50ixVHiClB0xCKf6qf90ZRU2QBCYDh6xaPi5z0Idftr2ZMqVjGmuUY77MZtuz803cWBe7j9fVu25JV1qn2nfW1U0rv2l4nKFR8vF6S1Iy_fkg8n7Ynz7l2Q0Thww5nal4TMY2fD/s1200/Top-Ten-Cyberattacks-of-2020-2021.png.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;630&quot; data-original-width=&quot;1200&quot; height=&quot;299&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDePTC0FZ4Ors_Oleg9sLG3Ne1UJ3ZJIKncjky5nKz1ZzPe50ixVHiClB0xCKf6qf90ZRU2QBCYDh6xaPi5z0Idftr2ZMqVjGmuUY77MZtuz803cWBe7j9fVu25JV1qn2nfW1U0rv2l4nKFR8vF6S1Iy_fkg8n7Ynz7l2Q0Thww5nal4TMY2fD/w587-h299/Top-Ten-Cyberattacks-of-2020-2021.png.webp&quot; width=&quot;587&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/5272664941242537302/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/5272664941242537302' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/5272664941242537302'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/5272664941242537302'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2022/02/top-ten-cyberattacks-of-2020-2021.html' title='Top Ten Cyberattacks of 2020-2021'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDePTC0FZ4Ors_Oleg9sLG3Ne1UJ3ZJIKncjky5nKz1ZzPe50ixVHiClB0xCKf6qf90ZRU2QBCYDh6xaPi5z0Idftr2ZMqVjGmuUY77MZtuz803cWBe7j9fVu25JV1qn2nfW1U0rv2l4nKFR8vF6S1Iy_fkg8n7Ynz7l2Q0Thww5nal4TMY2fD/s72-w587-h299-c/Top-Ten-Cyberattacks-of-2020-2021.png.webp" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-7807702728161605743</id><published>2021-12-31T13:52:00.001+03:00</published><updated>2023-09-12T13:57:38.625+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2021"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><title type='text'>The Top 10 Biggest Cyber Attacks Of 2021</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;h1 class=&quot;post-title&quot; style=&quot;background-color: white; box-sizing: border-box; color: #163145; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 1.75rem; line-height: 2.25rem; margin: 0.4375rem 0px 0.25rem; overflow-wrap: break-word; text-align: center;&quot;&gt;&lt;a href=&quot;https://expertinsights.com/insights/10-high-profile-attacks-2021/&quot; target=&quot;_blank&quot;&gt;The Top 10 Biggest Cyber Attacks Of 2021&lt;/a&gt;&lt;/h1&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFswDjTYnKtGwVHWnyLn0k01Wto_uDOn3dKhG0XowXcsCFTYVidEPE92r_RNV6Hou6EZvcbf5raB_xd5iK-uUbb20HypmPiFvxdzFyPeXV3jyPE_aUfrXPlL0uVhL75Yi-OujAHbYHX4vtBC5x-de2YBA9NqT0YcvFVabqBEdHEVW9LDaJbMDG/s1524/Screenshot%202023-09-12%20at%202.54.11%20PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;856&quot; data-original-width=&quot;1524&quot; height=&quot;270&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFswDjTYnKtGwVHWnyLn0k01Wto_uDOn3dKhG0XowXcsCFTYVidEPE92r_RNV6Hou6EZvcbf5raB_xd5iK-uUbb20HypmPiFvxdzFyPeXV3jyPE_aUfrXPlL0uVhL75Yi-OujAHbYHX4vtBC5x-de2YBA9NqT0YcvFVabqBEdHEVW9LDaJbMDG/w641-h270/Screenshot%202023-09-12%20at%202.54.11%20PM.png&quot; width=&quot;641&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/7807702728161605743/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/7807702728161605743' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/7807702728161605743'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/7807702728161605743'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2021/12/the-top-10-biggest-cyber-attacks-of-2021.html' title='The Top 10 Biggest Cyber Attacks Of 2021'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFswDjTYnKtGwVHWnyLn0k01Wto_uDOn3dKhG0XowXcsCFTYVidEPE92r_RNV6Hou6EZvcbf5raB_xd5iK-uUbb20HypmPiFvxdzFyPeXV3jyPE_aUfrXPlL0uVhL75Yi-OujAHbYHX4vtBC5x-de2YBA9NqT0YcvFVabqBEdHEVW9LDaJbMDG/s72-w641-h270-c/Screenshot%202023-09-12%20at%202.54.11%20PM.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-778402909767860531</id><published>2020-12-31T13:47:00.001+03:00</published><updated>2023-09-12T13:50:10.130+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2020"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><title type='text'>Top 10 cybersecurity incidents in 2020</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;h1 class=&quot;post-title entry-title&quot; style=&quot;-webkit-font-smoothing: antialiased; background-color: white; box-sizing: border-box; color: var(--color-black); font-family: Nunito; font-size: 40px; line-height: 1.25; margin: 0px; max-width: 80%; overflow-wrap: break-word; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.znetlive.com/blog/top-10-cybersecurity-incidents-in-2020/&quot; target=&quot;_blank&quot;&gt;Top 10 cybersecurity incidents in 2020&lt;/a&gt;&lt;/h1&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifg00zFw_A0NUcFRZ6YAi7Ndu5-zgU3T5t0S0QVh3j4bDs3IiNBLqFJ8st83DIQWmpre8ecLPatiyn9Qe3RC0rl9YoktlntuG1pNre4eXT1TyOBKD8LfjQNbzclGCIe6px1rArAHpGMJxvlZzcblX4cLa6JYepJHduRQO_jS2sb0wgX7c0iGvS/s1000/cybersecurity-featured-compressed-2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;625&quot; data-original-width=&quot;1000&quot; height=&quot;250&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifg00zFw_A0NUcFRZ6YAi7Ndu5-zgU3T5t0S0QVh3j4bDs3IiNBLqFJ8st83DIQWmpre8ecLPatiyn9Qe3RC0rl9YoktlntuG1pNre4eXT1TyOBKD8LfjQNbzclGCIe6px1rArAHpGMJxvlZzcblX4cLa6JYepJHduRQO_jS2sb0wgX7c0iGvS/w683-h250/cybersecurity-featured-compressed-2.jpg&quot; width=&quot;683&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/778402909767860531/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/778402909767860531' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/778402909767860531'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/778402909767860531'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2020/12/top-10-cybersecurity-incidents-in-2020.html' title='Top 10 cybersecurity incidents in 2020'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifg00zFw_A0NUcFRZ6YAi7Ndu5-zgU3T5t0S0QVh3j4bDs3IiNBLqFJ8st83DIQWmpre8ecLPatiyn9Qe3RC0rl9YoktlntuG1pNre4eXT1TyOBKD8LfjQNbzclGCIe6px1rArAHpGMJxvlZzcblX4cLa6JYepJHduRQO_jS2sb0wgX7c0iGvS/s72-w683-h250-c/cybersecurity-featured-compressed-2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-6769551021998713975</id><published>2019-12-31T13:45:00.005+03:00</published><updated>2023-09-12T13:47:28.833+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2019"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><title type='text'>The Top 10 Cybersecurity Stories Of 2019</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;h1 class=&quot;fs-headline speakable-headline font-base font-size should-redesign&quot; style=&quot;background-color: #fcfcfc; box-sizing: inherit; color: #333333; font-family: Merriweather, GeorgiaCustom; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size: 36px; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-numeric: normal; font-variation-settings: normal; line-height: 1.22; margin-block: 0px; margin: 8px 0px 0px;&quot;&gt;&lt;a href=&quot;https://www.forbes.com/sites/daveywinder/2019/12/27/the-top-10-cybersecurity-stories-of-2019-a-window-onto-the-2020-threatscape/?sh=203f6bed7992&quot; target=&quot;_blank&quot;&gt;The Top 10 Cybersecurity Stories Of 2019—A Window Onto The 2020 Threatscape&lt;/a&gt;&lt;/h1&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaq4-iRRu3U44CLEoiPvQI-H8WGtxlWyzXWUcKo8D-kqk2rOySssnZzXG_C9F9ttECRLYHbaY8GDeuOQDwuiObsxuYCQSqqehbnWOWudsJhKRsy0xtoY1k1GDCH3E2KCWZdce9OV8X1s2EmkNMH9cMZl3NemwofqrIY3lUukxf4V_ceSZI6iQL/s960/cybersecurity.webp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;640&quot; data-original-width=&quot;960&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaq4-iRRu3U44CLEoiPvQI-H8WGtxlWyzXWUcKo8D-kqk2rOySssnZzXG_C9F9ttECRLYHbaY8GDeuOQDwuiObsxuYCQSqqehbnWOWudsJhKRsy0xtoY1k1GDCH3E2KCWZdce9OV8X1s2EmkNMH9cMZl3NemwofqrIY3lUukxf4V_ceSZI6iQL/w647-h213/cybersecurity.webp&quot; width=&quot;647&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/6769551021998713975/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/6769551021998713975' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/6769551021998713975'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/6769551021998713975'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2019/12/the-top-10-cybersecurity-stories-of-2019.html' title='The Top 10 Cybersecurity Stories Of 2019'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaq4-iRRu3U44CLEoiPvQI-H8WGtxlWyzXWUcKo8D-kqk2rOySssnZzXG_C9F9ttECRLYHbaY8GDeuOQDwuiObsxuYCQSqqehbnWOWudsJhKRsy0xtoY1k1GDCH3E2KCWZdce9OV8X1s2EmkNMH9cMZl3NemwofqrIY3lUukxf4V_ceSZI6iQL/s72-w647-h213-c/cybersecurity.webp" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-5275050991140071555</id><published>2018-12-31T13:43:00.007+03:00</published><updated>2023-09-12T13:45:30.807+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2018"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><title type='text'>The 10 Biggest Cybersecurity News Stories Of 2018</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;h1 class=&quot;article-title card-title&quot; style=&quot;background-color: white; box-sizing: border-box; color: #1b1b1b; flex-shrink: 0; font-family: Arial, Verdana, &amp;quot;sans serif&amp;quot;; font-size: 1.75rem; line-height: 1.2; margin-bottom: 1.75rem !important; margin-top: var(--bs-gutter-y); max-width: 100%; padding-left: calc(var(--bs-gutter-x) * .5); padding-right: calc(var(--bs-gutter-x) * .5); width: 757.195px;&quot;&gt;&lt;a href=&quot;https://www.crn.com/slide-shows/security/the-10-biggest-cybersecurity-news-stories-of-2018&quot; target=&quot;_blank&quot;&gt;The 10 Biggest Cybersecurity News Stories Of 2018&lt;/a&gt;&lt;/h1&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1rtXf59gEoBhzh6shk3vgYaNs6f9TahfegtdxVVAKxRKEgR7R6bwFeWrEOt-b_xus90byDierALWujyef6rQe9WILFQqeJtPfyT0UmdAXocijNtRNC_CfkJ0gcpgDImD2uJtdT4Gzu6WETqRLGo5v_6UY_jJzgOg0fJQftcnu7ypxgJzBwpiv/s610/cybersecurity-data-lock-1.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;458&quot; data-original-width=&quot;610&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1rtXf59gEoBhzh6shk3vgYaNs6f9TahfegtdxVVAKxRKEgR7R6bwFeWrEOt-b_xus90byDierALWujyef6rQe9WILFQqeJtPfyT0UmdAXocijNtRNC_CfkJ0gcpgDImD2uJtdT4Gzu6WETqRLGo5v_6UY_jJzgOg0fJQftcnu7ypxgJzBwpiv/w648-h240/cybersecurity-data-lock-1.jpeg&quot; width=&quot;648&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/5275050991140071555/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/5275050991140071555' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/5275050991140071555'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/5275050991140071555'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2018/12/the-10-biggest-cybersecurity-news.html' title='The 10 Biggest Cybersecurity News Stories Of 2018'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1rtXf59gEoBhzh6shk3vgYaNs6f9TahfegtdxVVAKxRKEgR7R6bwFeWrEOt-b_xus90byDierALWujyef6rQe9WILFQqeJtPfyT0UmdAXocijNtRNC_CfkJ0gcpgDImD2uJtdT4Gzu6WETqRLGo5v_6UY_jJzgOg0fJQftcnu7ypxgJzBwpiv/s72-w648-h240-c/cybersecurity-data-lock-1.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-9219428095213802673</id><published>2017-12-31T13:41:00.001+03:00</published><updated>2023-09-12T13:42:47.565+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2017"/><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><title type='text'>Top 10 cyber crime stories of 2017</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;h1 class=&quot;main-article-title&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: 0px center; background-repeat: initial; background-size: initial; color: #323232; font-family: Arial, sans-serif; font-size: 42px; letter-spacing: -0.02em; line-height: 1.1em; margin: 30px 0px 25px; min-height: 0px; padding: 0px 40px;&quot;&gt;&lt;a href=&quot;https://www.computerweekly.com/news/450431761/Top-10-cyber-crime-stories-of-2017&quot; target=&quot;_blank&quot;&gt;Top 10 cyber crime stories of 2017&lt;/a&gt;&lt;/h1&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguDQjVQSlvWUOtkEr1CfzFPAyDUjQkjq-Qwow0DHL8IlMO3LoZHiL7rkMAY8PgOjRNHXzP7uvWHexc5H0oDvsT69S2K8bS33QnFdxYheL9wrD1jjpfttjtCAfw6ZQon7PZTmEEJocbYd35FRAJpFBPCVcwZxG6lsrGMLuPWHV2t3HxoqFtKfFi/s1200/cyber-threats-fotolia.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;400&quot; data-original-width=&quot;1200&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguDQjVQSlvWUOtkEr1CfzFPAyDUjQkjq-Qwow0DHL8IlMO3LoZHiL7rkMAY8PgOjRNHXzP7uvWHexc5H0oDvsT69S2K8bS33QnFdxYheL9wrD1jjpfttjtCAfw6ZQon7PZTmEEJocbYd35FRAJpFBPCVcwZxG6lsrGMLuPWHV2t3HxoqFtKfFi/w598-h200/cyber-threats-fotolia.jpg&quot; width=&quot;598&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/9219428095213802673/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/9219428095213802673' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/9219428095213802673'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/9219428095213802673'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2017/12/top-10-cyber-crime-stories-of-2017.html' title='Top 10 cyber crime stories of 2017'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguDQjVQSlvWUOtkEr1CfzFPAyDUjQkjq-Qwow0DHL8IlMO3LoZHiL7rkMAY8PgOjRNHXzP7uvWHexc5H0oDvsT69S2K8bS33QnFdxYheL9wrD1jjpfttjtCAfw6ZQon7PZTmEEJocbYd35FRAJpFBPCVcwZxG6lsrGMLuPWHV2t3HxoqFtKfFi/s72-w598-h200-c/cyber-threats-fotolia.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-6992821060271604957</id><published>2016-12-31T13:35:00.014+03:00</published><updated>2023-09-12T13:40:12.769+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2016"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="security incidents"/><title type='text'>Top Stories of Cyber Security 2016</title><content type='html'>&lt;h1 style=&quot;background-color: white; box-sizing: inherit; color: #111928; font-family: RobotoSlab-Bold, &amp;quot;Open Sans&amp;quot;, Helvetica, Arial, sans-serif; font-size: 2.75rem; line-height: 3.3rem; margin-bottom: 0.5rem; margin-top: 0px; outline: none;&quot;&gt;&lt;a href=&quot;https://resources.infosecinstitute.com/topics/news/the-biggest-cyber-security-incidents-of-2016/&quot; target=&quot;_blank&quot;&gt;The Biggest Cyber-Security Incidents of 2016&lt;/a&gt;&lt;/h1&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEdHnA57AjTgYu977NZXidZnvGjTn_3FZwrc1Bs_DCXVHS0olDvgkO9dJO4ke_WR6KGpXTwAjZNwEXn70Iomg2gmo67JYX65N3CcNal90t3FX_Ct5b7ix1VqUoCKiryU9An1tiz94FnIPTFRG-95ZBI6hWM54mUMlnHXxTF9xfky1XdMsVWUf5/s389/cybersecurity%20month2016.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;129&quot; data-original-width=&quot;389&quot; height=&quot;194&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEdHnA57AjTgYu977NZXidZnvGjTn_3FZwrc1Bs_DCXVHS0olDvgkO9dJO4ke_WR6KGpXTwAjZNwEXn70Iomg2gmo67JYX65N3CcNal90t3FX_Ct5b7ix1VqUoCKiryU9An1tiz94FnIPTFRG-95ZBI6hWM54mUMlnHXxTF9xfky1XdMsVWUf5/w587-h194/cybersecurity%20month2016.jpeg&quot; width=&quot;587&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/6992821060271604957/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/6992821060271604957' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/6992821060271604957'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/6992821060271604957'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2016/12/top-stories-of-cyber-security-2016.html' title='Top Stories of Cyber Security 2016'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEdHnA57AjTgYu977NZXidZnvGjTn_3FZwrc1Bs_DCXVHS0olDvgkO9dJO4ke_WR6KGpXTwAjZNwEXn70Iomg2gmo67JYX65N3CcNal90t3FX_Ct5b7ix1VqUoCKiryU9An1tiz94FnIPTFRG-95ZBI6hWM54mUMlnHXxTF9xfky1XdMsVWUf5/s72-w587-h194-c/cybersecurity%20month2016.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-4842753757297816529</id><published>2015-12-31T14:01:00.005+03:00</published><updated>2023-09-12T14:02:43.916+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="infosec 2015"/><title type='text'>The Top 10 Biggest Data Breaches of 2015</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;h1 class=&quot;banner-title&quot; style=&quot;background-color: #333333; box-sizing: border-box; color: white; font-family: &amp;quot;Work Sans&amp;quot;, sans-serif; font-size: 40px; font-weight: 300; line-height: 1; margin-bottom: 0.5em; margin-top: 0px; text-align: center;&quot;&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;The Top 10 Biggest Data Breaches of 2015&lt;/span&gt;&lt;/h1&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1D8I9GwAbBUGkSeM27rX8HbryGZlUD8TR6pj9CD75nsAGnzBmD-Q4kQhkl87G7sESZ8NTV3yOPsjB_kjYrmS0rCuDY4wmRl2rfPiHUUuJmn1cTE2COfPezxZ5RQpA92PrzChp7RzwEmRm8LS8gDa38g6uOa2UoCdetU_CVekDBXg71wwQvjqb/s960/voter-data-breach.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;539&quot; data-original-width=&quot;960&quot; height=&quot;198&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1D8I9GwAbBUGkSeM27rX8HbryGZlUD8TR6pj9CD75nsAGnzBmD-Q4kQhkl87G7sESZ8NTV3yOPsjB_kjYrmS0rCuDY4wmRl2rfPiHUUuJmn1cTE2COfPezxZ5RQpA92PrzChp7RzwEmRm8LS8gDa38g6uOa2UoCdetU_CVekDBXg71wwQvjqb/w661-h198/voter-data-breach.jpeg&quot; width=&quot;661&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;box-sizing: border-box;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/4842753757297816529/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/4842753757297816529' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/4842753757297816529'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/4842753757297816529'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2015/12/the-top-10-biggest-data-breaches-of-2015.html' title='The Top 10 Biggest Data Breaches of 2015'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1D8I9GwAbBUGkSeM27rX8HbryGZlUD8TR6pj9CD75nsAGnzBmD-Q4kQhkl87G7sESZ8NTV3yOPsjB_kjYrmS0rCuDY4wmRl2rfPiHUUuJmn1cTE2COfPezxZ5RQpA92PrzChp7RzwEmRm8LS8gDa38g6uOa2UoCdetU_CVekDBXg71wwQvjqb/s72-w661-h198-c/voter-data-breach.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-8331107504453376422</id><published>2015-07-18T11:28:00.001+03:00</published><updated>2015-07-18T11:28:20.643+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Airplane"/><category scheme="http://www.blogger.com/atom/ns#" term="Encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability"/><category scheme="http://www.blogger.com/atom/ns#" term="wifi"/><title type='text'>Airplane Wi-Fi is not safe... </title><content type='html'>&lt;p dir=&quot;ltr&quot;&gt;Airplane Wi-Fi is not safe... #WiFi #Encryption #Vulnerability &lt;a href=&quot;http://venturebeat.com/2015/07/11/airplane-wi-fi-is-not-safe/﻿&quot;&gt;http://venturebeat.com/2015/07/11/airplane-wi-fi-is-not-safe/&amp;#65279;&lt;/a&gt;&lt;/p&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqUqy2PsQyMl8Of_lhvk9_SSYLZ85kdSIVZ4pyWbp58OWZywKADWNiBeTMzr_aN2JyQaJWcMN4P3eShRUttB-0Iy2CE93_nquAxgUuqt3O2rlbW3fzphDMPAbHyqXoBI84XTl0/s1600/IMG_20150713_081432.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt; &lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqUqy2PsQyMl8Of_lhvk9_SSYLZ85kdSIVZ4pyWbp58OWZywKADWNiBeTMzr_aN2JyQaJWcMN4P3eShRUttB-0Iy2CE93_nquAxgUuqt3O2rlbW3fzphDMPAbHyqXoBI84XTl0/s640/IMG_20150713_081432.jpg&quot;&gt; &lt;/a&gt; &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/8331107504453376422/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/8331107504453376422' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/8331107504453376422'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/8331107504453376422'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2015/07/airplane-wi-fi-is-not-safe.html' title='Airplane Wi-Fi is not safe... '/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqUqy2PsQyMl8Of_lhvk9_SSYLZ85kdSIVZ4pyWbp58OWZywKADWNiBeTMzr_aN2JyQaJWcMN4P3eShRUttB-0Iy2CE93_nquAxgUuqt3O2rlbW3fzphDMPAbHyqXoBI84XTl0/s72-c/IMG_20150713_081432.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-3966792013393934502</id><published>2015-07-18T11:13:00.001+03:00</published><updated>2015-07-18T11:13:57.478+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Blackout"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Attack"/><category scheme="http://www.blogger.com/atom/ns#" term="cyberwar"/><category scheme="http://www.blogger.com/atom/ns#" term="IoT"/><category scheme="http://www.blogger.com/atom/ns#" term="Loydds"/><category scheme="http://www.blogger.com/atom/ns#" term="PowerGrid"/><category scheme="http://www.blogger.com/atom/ns#" term="Risk Studies"/><category scheme="http://www.blogger.com/atom/ns#" term="SCADA"/><category scheme="http://www.blogger.com/atom/ns#" term="University of Cambridge"/><title type='text'>Trillion dollar risk of a cyber attack on us power grid</title><content type='html'>&lt;p dir=&quot;ltr&quot;&gt;#PowerGrid #CyberAttack #CyberWar #RiskStudies #Blackout #SCADA #IoT #Loydds #UniversityofCambridge &lt;a href=&quot;http://www.forbes.com/sites/uciliawang/2015/07/08/report-the-trillion-dollar-risk-of-a-cyber-attack-on-u-s-power-grid/?linkId=15400010﻿&quot;&gt;http://www.forbes.com/sites/uciliawang/2015/07/08/report-the-trillion-dollar-risk-of-a-cyber-attack-on-u-s-power-grid/?linkId=15400010&amp;#65279;&lt;/a&gt;&lt;/p&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;a href=&quot;http://lh3.googleusercontent.com/-qp3mrz4YsUo/VaoKwrJ-muI/AAAAAAAAPH0/s1600/IMG_20150712_145520.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt; &lt;img border=&quot;0&quot; src=&quot;http://lh3.googleusercontent.com/-qp3mrz4YsUo/VaoKwrJ-muI/AAAAAAAAPH0/s640/IMG_20150712_145520.jpg&quot;&gt; &lt;/a&gt; &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/3966792013393934502/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/3966792013393934502' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/3966792013393934502'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/3966792013393934502'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2015/07/trillion-dollar-risk-of-cyber-attack-on.html' title='Trillion dollar risk of a cyber attack on us power grid'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://lh3.googleusercontent.com/-qp3mrz4YsUo/VaoKwrJ-muI/AAAAAAAAPH0/s640/s72-c/IMG_20150712_145520.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-5450017497114668841</id><published>2015-07-18T07:12:00.001+03:00</published><updated>2015-07-18T07:12:22.986+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="0day"/><category scheme="http://www.blogger.com/atom/ns#" term="Adobe"/><category scheme="http://www.blogger.com/atom/ns#" term="Adobe Flash"/><category scheme="http://www.blogger.com/atom/ns#" term="exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacked Team"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Team"/><category scheme="http://www.blogger.com/atom/ns#" term="uninstall"/><category scheme="http://www.blogger.com/atom/ns#" term="Unpatchable"/><title type='text'>Hacking Team zero day exploits of flash</title><content type='html'>&lt;p dir=&quot;ltr&quot;&gt;#HackingTeam #HackedTeam #Adobe #AdobeFlash #0day #Exploit #uninstall #Unpatchable &lt;a href=&quot;https://threatpost.com/hacking-team-flash-zero-day-weaponized-in-exploit-kits/113663﻿&quot;&gt;https://threatpost.com/hacking-team-flash-zero-day-weaponized-in-exploit-kits/113663&amp;#65279;&lt;/a&gt;&lt;/p&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTlXK_B2_oo2fi6ZBC_jvEHH-PblKTRwTdlYN1whhm4d1kloHlo1uUh7VSdyA_ptcaNgCr639b-AYKOFE-7rffAP8tsehmAM-MJEWf-w-qk9VBxvBfoYvldpgCUHHFP7CLCUM9/s1600/IMG_20150711_122921.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt; &lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTlXK_B2_oo2fi6ZBC_jvEHH-PblKTRwTdlYN1whhm4d1kloHlo1uUh7VSdyA_ptcaNgCr639b-AYKOFE-7rffAP8tsehmAM-MJEWf-w-qk9VBxvBfoYvldpgCUHHFP7CLCUM9/s640/IMG_20150711_122921.jpg&quot;&gt; &lt;/a&gt; &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/5450017497114668841/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/5450017497114668841' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/5450017497114668841'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/5450017497114668841'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2015/07/hacking-team-zero-day-exploits-of-flash.html' title='Hacking Team zero day exploits of flash'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTlXK_B2_oo2fi6ZBC_jvEHH-PblKTRwTdlYN1whhm4d1kloHlo1uUh7VSdyA_ptcaNgCr639b-AYKOFE-7rffAP8tsehmAM-MJEWf-w-qk9VBxvBfoYvldpgCUHHFP7CLCUM9/s72-c/IMG_20150711_122921.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-2498902098728893672</id><published>2015-07-18T07:09:00.001+03:00</published><updated>2015-07-18T07:09:34.125+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Attack"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacked"/><category scheme="http://www.blogger.com/atom/ns#" term="Madonna"/><category scheme="http://www.blogger.com/atom/ns#" term="privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="Rebel Heart"/><category scheme="http://www.blogger.com/atom/ns#" term="TV Talent"/><title type='text'>Madonna hacker jailed</title><content type='html'>&lt;p dir=&quot;ltr&quot;&gt;#Madonna #Hacked #CyberAttack #RebelHeart #TVTalent #Privacy &lt;a href=&quot;http://www.welivesecurity.com/2015/07/10/aspiring-singer-jailed-hacking-madonna-stealing-unreleased-tracks/﻿&quot;&gt;http://www.welivesecurity.com/2015/07/10/aspiring-singer-jailed-hacking-madonna-stealing-unreleased-tracks/&amp;#65279;&lt;/a&gt;&lt;/p&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNropUAXcw6pDyOKvS1G4-IDEN3vhvjBUmfR28vcSjDf8p2-OJ4DUq_PagowKtNQMFp0XTGxwwM-eISNFob4p4L-MHvj7vjwDtvceeaidNO6IPN9WcZ5yh3ILFxbrsJ5QqYqR0/s1600/IMG_20150710_082300.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt; &lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNropUAXcw6pDyOKvS1G4-IDEN3vhvjBUmfR28vcSjDf8p2-OJ4DUq_PagowKtNQMFp0XTGxwwM-eISNFob4p4L-MHvj7vjwDtvceeaidNO6IPN9WcZ5yh3ILFxbrsJ5QqYqR0/s640/IMG_20150710_082300.jpg&quot;&gt; &lt;/a&gt; &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/2498902098728893672/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/2498902098728893672' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/2498902098728893672'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/2498902098728893672'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2015/07/madonna-hacker-jailed.html' title='Madonna hacker jailed'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNropUAXcw6pDyOKvS1G4-IDEN3vhvjBUmfR28vcSjDf8p2-OJ4DUq_PagowKtNQMFp0XTGxwwM-eISNFob4p4L-MHvj7vjwDtvceeaidNO6IPN9WcZ5yh3ILFxbrsJ5QqYqR0/s72-c/IMG_20150710_082300.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-4771242256584048849</id><published>2015-07-18T07:07:00.001+03:00</published><updated>2015-07-18T07:07:19.030+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="by the numbers"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Attack"/><category scheme="http://www.blogger.com/atom/ns#" term="Data Breach"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacked"/><category scheme="http://www.blogger.com/atom/ns#" term="Office Personnel Management"/><category scheme="http://www.blogger.com/atom/ns#" term="opm"/><category scheme="http://www.blogger.com/atom/ns#" term="Stats"/><title type='text'>OPM Cyber Attack by the numbers</title><content type='html'>&lt;p dir=&quot;ltr&quot;&gt;#OPM #OfficePersonnelManagement #bythenumbers #DataBreach #Hacked #CyberAttack #Stats &lt;a href=&quot;http://m.nextgov.com/cybersecurity/2015/07/numbers-victims-opm-hack/117463/﻿&quot;&gt;http://m.nextgov.com/cybersecurity/2015/07/numbers-victims-opm-hack/117463/&amp;#65279;&lt;/a&gt;&lt;/p&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBblDOLAssGoym7_dvBuyoptIjEfsm8nK2wzz0ACt_vYU2Fk0YtZ-mjl8iEFR4EsV6InDTbCbNIxhsKTGmEXr5lixApIThUi6vtNUcMMr6fY1xhE4lBTLQ4-J_oAxtMq-0yseF/s1600/IMG_20150710_073939.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt; &lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBblDOLAssGoym7_dvBuyoptIjEfsm8nK2wzz0ACt_vYU2Fk0YtZ-mjl8iEFR4EsV6InDTbCbNIxhsKTGmEXr5lixApIThUi6vtNUcMMr6fY1xhE4lBTLQ4-J_oAxtMq-0yseF/s640/IMG_20150710_073939.jpg&quot;&gt; &lt;/a&gt; &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/4771242256584048849/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/4771242256584048849' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/4771242256584048849'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/4771242256584048849'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2015/07/opm-cyber-attack-by-numbers.html' title='OPM Cyber Attack by the numbers'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBblDOLAssGoym7_dvBuyoptIjEfsm8nK2wzz0ACt_vYU2Fk0YtZ-mjl8iEFR4EsV6InDTbCbNIxhsKTGmEXr5lixApIThUi6vtNUcMMr6fY1xhE4lBTLQ4-J_oAxtMq-0yseF/s72-c/IMG_20150710_073939.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-14940812.post-894703541290994583</id><published>2015-07-18T07:03:00.001+03:00</published><updated>2015-07-18T07:03:23.486+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bcp"/><category scheme="http://www.blogger.com/atom/ns#" term="DHS"/><category scheme="http://www.blogger.com/atom/ns#" term="Glitch"/><category scheme="http://www.blogger.com/atom/ns#" term="NYSE"/><category scheme="http://www.blogger.com/atom/ns#" term="snafu"/><category scheme="http://www.blogger.com/atom/ns#" term="System Down"/><category scheme="http://www.blogger.com/atom/ns#" term="united airlines"/><category scheme="http://www.blogger.com/atom/ns#" term="WSJ"/><category scheme="http://www.blogger.com/atom/ns#" term="wtf"/><title type='text'>Glitch or SNAFU WSJ, NYSE, United Airlines System Down</title><content type='html'>&lt;p dir=&quot;ltr&quot;&gt;#BCP #Glitch #SNAFU #WSJ #NYSE #UnitedAirlines #SystemDown #WTF #DHS &lt;a href=&quot;http://www.salon.com/2015/07/08/bizarre_new_york_stock_exchange_wall_street_journal_and_united_airlines_downed_by_technical_glitches/﻿&quot;&gt;http://www.salon.com/2015/07/08/bizarre_new_york_stock_exchange_wall_street_journal_and_united_airlines_downed_by_technical_glitches/&amp;#65279;&lt;/a&gt;&lt;/p&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWbnYiY2DzHZp_aEZHmSYIAjSDWHMhRj4nUPuD45ZQt8VcjjSssVW_dv2OkllF5HOtMdCKTUOE8y5_tUFi0tnQnBQ7xegPWNz55YhKAce4WhRH2bpJYzac6HDh0qGp5K4qpdOL/s1600/IMG_20150709_012357.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt; &lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWbnYiY2DzHZp_aEZHmSYIAjSDWHMhRj4nUPuD45ZQt8VcjjSssVW_dv2OkllF5HOtMdCKTUOE8y5_tUFi0tnQnBQ7xegPWNz55YhKAce4WhRH2bpJYzac6HDh0qGp5K4qpdOL/s640/IMG_20150709_012357.jpg&quot;&gt; &lt;/a&gt; &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://4sec.blogspot.com/feeds/894703541290994583/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/14940812/894703541290994583' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/894703541290994583'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/14940812/posts/default/894703541290994583'/><link rel='alternate' type='text/html' href='http://4sec.blogspot.com/2015/07/glitch-or-snafu-wsj-nyse-united.html' title='Glitch or SNAFU WSJ, NYSE, United Airlines System Down'/><author><name>Jorge Sebastiao</name><uri>http://www.blogger.com/profile/12498220433844341294</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='27' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB-rE8r9yQDytHDH04wnu4ZfA2TdE2LhUdsZrkjq5Q2ztJ-oJfMi13r0TFmHNtnLNGYkNpsdUfkxFetA58nTMRtjEj6bjVoF6OBkQ-bq0sv0cdfW-vv_sIUH0D3z8FtLj6fBYotVB6aXdjYJiiDQuxmsVOsk4YSDoDbCNv-79ELKrwFUs/s220/Jorge%20speaker%20top%20Profile%20crop.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWbnYiY2DzHZp_aEZHmSYIAjSDWHMhRj4nUPuD45ZQt8VcjjSssVW_dv2OkllF5HOtMdCKTUOE8y5_tUFi0tnQnBQ7xegPWNz55YhKAce4WhRH2bpJYzac6HDh0qGp5K4qpdOL/s72-c/IMG_20150709_012357.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>