< ciso
brief />
Tag Banner

All news with #how to tag

128 articles · page 3 of 7

Agent Factory Recap: Reinforcement Learning on TPUs

🤖 This recap of the Agent Factory holiday special summarizes practical guidance on model fine-tuning, with a focus on reinforcement learning (RL) and Google’s TPU infrastructure. Hosts Shir Meir Lador and Don McCasland speak with Kyle Meggs from the TPU Training Team about when to fine-tune, the distinction between pre‑training, SFT, and RL, and why specialized workloads benefit from hosted solutions like MaxText on TPUs. The post also demonstrates a GRPO demo using Pathways, vLLM, and Tunix components to show RL at scale.
read more →

Model Security Misses the Point: Secure AI Workflows

🛡️As AI copilots and assistants are embedded into daily work, recent incidents show the primary risk lies in surrounding workflows rather than in the models themselves. Malicious Chrome extensions that exfiltrated ChatGPT and DeepSeek chats and prompt injections that tricked an AI coding assistant into executing malware exploited integration contexts, not model internals. The piece advises mapping AI usage, applying least-privilege, enforcing middleware guardrails to scan outputs, and using dynamic SaaS platforms like Reco to detect and control risky workflows.
read more →

Four Outdated SOC Habits That Increase MTTR in 2026

🔍 In 2026 many SOCs still rely on legacy workflows—manual sample reviews, static reputation checks, fragmented tooling, and frequent, avoidable escalations—that slow investigations and drive alert fatigue. The article recommends shifting to automation-optimized, behavior-focused operations using interactive sandboxes to detonate threats, surface rich behavioral indicators, and integrate results into SIEM, SOAR, and EDR. These changes can shorten MTTR, accelerate detection, and reduce Tier 1→Tier 2 escalations while enabling analysts to focus on high-priority response.
read more →

Incident Response Perspectives with Terryn Valikodath

🔍 Terryn Valikodath, Senior Incident Response Consultant at Cisco Talos, describes a role that blends technical investigation with clear communication and proactive planning. He explains how his team balances developing incident response plans, running tabletop exercises and threat hunts with hands-on reactive investigations and remediation. Terryn highlights the reward of teaching through multi-day cyber range trainings and the satisfaction of helping organizations recover and build trust.
read more →

When Your Personal Data Appears on the Dark Web - What to Do

🔒 If you learn your personal or financial data is on the dark web, act quickly: cybercriminals use stolen PII, credentials, session cookies and payment details to commit account takeover, identity theft and fraud. Immediately change compromised passwords, enable MFA (prefer authenticator apps or hardware keys), sign out of all devices, scan for infostealer malware and contact your bank to freeze or reissue cards. For longer-term protection, freeze credit, tighten privacy settings, use email aliasing and a password manager, and enroll in monitoring services such as HaveIBeenPwned.
read more →

De-risking Network Migration with VPC Flow Logs & Analyzer

🔍 Hackensack Meridian Health used VPC Flow Logs and Flow Analyzer to obtain precise, end-to-end visibility of Cloud Interconnect traffic before a major Google Cloud network migration. They enabled VLAN-attachment flow logs, aggregated ingress/egress flows (IPs, ports, bytes, timestamps), and organized results into sankey diagrams mapping data center → region → VPC → application. This process revealed critical flows early and shortened incident detection to 3 minutes and resolution to 5 minutes, materially de-risking the cutover.
read more →

Combining Arbor Edge Defense with CDN DDoS Protection

🔒 NETSCOUT's Arbor Edge Defense (AED) complements CDN-based DDoS mitigation by providing inline, on-premises protection for attacks that cloud scrubbing can miss. AED uses AI/ML-driven stateless packet processing and ATLAS threat intelligence to address application-layer, TCP state-exhaustion, and outbound threats. Together, CDN protections and AED form a layered, adaptive defense-in-depth strategy that preserves bandwidth and safeguards availability.
read more →

Effective Post-Incident Security Reviews: Key Practices

🔍 Post-incident reviews are a structured means to understand security incidents and improve future defenses. Conducted promptly, they preserve fresh details and enable accurate timelines that reveal where delays or failures occurred. Reviews must include root-cause analysis, evaluation of detection and response performance, and assessment of business impact. Involving legal, governance, finance, HR, and board stakeholders helps connect technical findings to policy and risk decisions, while avoiding blame and assigning concrete, timebound follow-up is essential.
read more →

Six Essential Components for an Effective Incident Response

🔒 An effective Incident Response plan must combine impact analysis, communications, clear roles, threat awareness, testing, and modular simplicity. The article outlines six essential components—including Business Impact Analysis, a comprehensive communications strategy, defined response roles, visibility across the threat landscape, regular testing, and modular playbooks—that help organizations maintain resilience during major outages or cyberattacks. Experts emphasize practical playbooks, pre-approved message templates, and disciplined After-Action Reviews to reduce downtime and ensure continuous improvement.
read more →

Eight Cybersecurity Resolutions for 2026 Readiness

🔒 Kaspersky outlines eight practical cybersecurity resolutions to take into 2026 after a transformative 2025 marked by sweeping internet laws and widespread AI adoption. The guidance covers legal awareness, safer access methods, and mitigation against document-leak risks. It also warns about new scam tactics, urges cautious AI use, subscription audits, longevity practices for devices, and strengthened smart‑home security.
read more →

Creating a Practical Ransomware Playbook for Response

🛡️ Organizations must build a ransomware playbook that pairs planning, technology, and people to reduce disruption and protect business continuity. Regular tabletop exercises create the muscle memory experts recommend, clarifying decision authority, communications, and containment steps across legal, IT, and executive stakeholders. Prevention should be layered — prioritized patching, behavior-based EDR, email/phishing defenses, MFA, least-privilege controls, and verified offline backups — while recovery playbooks, pre-engaged legal and forensics contacts, and tested restore procedures speed remediation and limit reputational harm.
read more →

IAM Policy Autopilot: Open-source IAM Policy Generator

🔧 IAM Policy Autopilot is an open-source static analysis tool that generates baseline AWS IAM identity-based policies by analyzing application code locally. Available as a CLI and an MCP server, it integrates with MCP-compatible AI coding assistants to produce syntactically correct, dependency-aware policies and to troubleshoot Access Denied errors. The tool favors functionality during initial deployments and recommends reviewing and tightening generated policies to meet least-privilege principles as applications mature.
read more →

Using Chaos Engineering to Validate Disaster Recovery Plans

🔬 Chaos engineering converts disaster recovery assumptions into measurable facts by running controlled experiments that simulate realistic failures and quantify impact. Instead of relying on audits or tabletop drills, teams define a steady state, form testable hypotheses, inject targeted failures, and use automated probes to measure effects on SLOs. This approach exposes gaps such as failover delays or error spikes and provides data to iterate DR procedures. Start small, build confidence, and consider engaging Google Cloud professional services for guidance.
read more →

Building a Production-Ready AI Security Foundation

🔒 This guide presents a practical defense-in-depth approach to move generative AI projects from prototype to production by protecting the application, data, and infrastructure layers. It includes hands-on labs demonstrating how to deploy Model Armor for real-time prompt and response inspection, implement Sensitive Data Protection pipelines to detect and de-identify PII, and harden compute and storage with private VPCs, Secure Boot, and service perimeter controls. Reusable templates, automated jobs, and integration blueprints help teams reduce prompt injection, data leakage, and exfiltration risk while aligning operational controls with compliance and privacy expectations.
read more →

Phishing, Privileges and Passwords: Identity Risk Guide

🔒Identity-focused attacks are driving major breaches across industries, with recent vishing incidents at M&S and Co-op enabling ransomware intrusions and combined losses exceeding £500 million. Attackers harvest credentials via infostealers, targeted phishing/smishing/vishing, breached password stores and automated attacks like credential stuffing. Implement least privilege, strong unique passwords in managers, MFA (authenticator apps or passkeys), PAM and automated identity lifecycle controls to limit blast radius.
read more →

Designing for GKE's Flat Network: Practical Recommendations

🔍 This post previews Google's new design recommendation for leveraging GKE's flat network, explaining how it differs from island-mode networking and how teams can adapt existing architectures. It highlights recommended patterns and a reference design that emulates island-mode behavior within the flat model. The guidance focuses on IP address management, scalability, and integration points to ease migration for critical workloads such as generative AI.
read more →

How Companies Can Prepare for Emerging AI Security Threats

🔒 Generative AI introduces new attack surfaces that alter trust relationships between users, applications and models. Siemens' pentest and security teams differentiate Offensive Security (targeted technical pentests) from Red Teaming (broader organizational simulations of real attackers). Traditional ML risks such as image or biometric misclassification remain relevant, but experts now single out prompt injection as the most serious threat — simple crafted inputs can leak system prompts, cause misinformation, or convert innocuous instructions into dangerous command injections.
read more →

Practical Steps to Minimize Key Exposure in AWS Environments

🔐 This AWS Security blog by Jennifer Paz outlines a layered, practical approach to reduce exposure from long‑term AWS credentials. It recommends discovery and risk assessment with CodeGuru Security, IAM Access Analyzer, credential reports, and Trusted Advisor, followed by enforcement using SCPs and RCPs to create a network data perimeter. The post also covers runtime protections (security groups, NACLs, Network Firewall, AWS WAF), automated rotation using Secrets Manager or rotation patterns, and threat detection via GuardDuty, all intended to bridge the gap until migration to temporary credentials is feasible.
read more →

Addressing Password Management Challenges to Protect Data

🔒 Enterprises and SMBs have invested heavily in authentication and IAM, but those controls are only as strong as password management. Compromised credentials remain a leading cause of breaches while the average employee manages over 100 accounts, creating operational and compliance burdens. Dedicated password managers can cut support costs by up to 80% and lower incident rates, but success requires strong user adoption and integration with SSO, MFA, LDAP/AD and privileged access systems.
read more →

Amazon MSK Console and Public APIs for Kafka Topics

🔍 Amazon Managed Streaming for Apache Kafka (Amazon MSK) now exposes topic listings and detailed topic views directly in the MSK console and via three new public APIs. You can browse and search topics within a cluster, quickly review replication settings and partition counts, and drill into per-topic configuration and partition-level metrics without installing Kafka admin clients. The new ListTopics, DescribeTopic, and DescribeTopicPartitions APIs are available through the AWS CLI and SDKs; these features require MSK Provisioned clusters running Kafka 3.6+ and appropriate IAM permissions.
read more →