Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date JSON Web Token (JWTs) are Dangerous Will Johnston: Senior Developer Growth Manager JSON Web Tokens are a popular choice for managing user sessions. However, many security experts at companies like Auth0 and Okta have published numero... 6 hours ago | 30 mins Cyber Notes Cast - How to Manage Privileges in Endpoints? senhasegura If you are running an organization, you should be concerned with managing endpoint privileges to ensure devices such as laptops, smartphones, and tabl... March 22, 2023 3:00pm When ChatGPT is Confidently Wrong Simon Allardice, Creative Director and Principal Author You’ve seen articles on the factual mistakes ChatGPT gives people—how it'll confidently mess up school reports or financial interpretation. If you wor... 6 days ago | 8 mins Know Thy Enemy in 30 Minutes Steve Benton, VP Anomali Threat Research, Anomali and Nate Huber, Former Intel Analyst, FBI “If you know neither the enemy nor yourself, you will succumb in every battle.” ― Sun Tzu, The Art of War BC500 Press, media, open source, and vend... March 28, 2023 3:00pm How to Automate Remote IT Onboarding with Workday, BambooHR, and Namely Alex Henthorn-Iwane and Justin Li, Firstbase 80% of new hires who receive poor onboarding plan to quit—especially if they’re remote workers, according to a recent Forbes article. Onboarding is ... March 29, 2023 5:00pm Cyber Notes Cast - Overview of Texas data privacy laws senhasegura Texas is one of the richest states in the USA and has been receiving a large amount of tech companies in recent years: Oracle, Cloudflare, and Tesla ... 2 weeks ago | 6 mins Cyber Notes Cast - HIPAA Five Tips for Complying with The Certificate senhasegura What is HIPAA? Currently, this is one of the most frequently asked questions by many professionals working in the healthcare industry, especially in t... 2 weeks ago | 7 mins Cyber Notes Cast - Credential Management a bunker for Code War senhasegura When asked, Thomas Waite - author of the book Lethal Code - “Why did he decide to write cyber thrillers?”, his answer was: “Because we've gone from th... 2 weeks ago | 14 mins Cyber Notes Cast - Common Question about PAM senhasegura “The ability to ask questions is the greatest resource in learning the truth.” (Carl Gustav Jung) - As digital technology assumes an important role as... 2 weeks ago | 9 mins Cyber Notes Cast - Secrets of Cyber Resilience senhasegura In a cyber attack, hackers can access critical systems and data, compromising the entire corporation, which may never recover from the attack. Any co... 2 weeks ago | 7 mins Load more