Posts by Jeff
CISO Tradecraft Podcast- 178 – Cyber Threat Intelligence with Jeff Majka & Andrew Dutton
In this episode of CISO Tradecraft, hosts G Mark Hardy and guests Jeff Majka and Andrew Dutton discuss the vital role of cyber threat intelligence in cybersecurity. They explore how Security Bulldog’s AI-powered platform helps enterprise cybersecurity teams efficiently remediate vulnerabilities by processing vast quantities of data, thereby saving time and enhancing productivity. The conversation…
Read MoreEnhancing Productivity and Accelerating Remediation: The Power of OSINT
In today’s rapidly evolving digital landscape, the ability to swiftly gather accurate and relevant information is crucial for maintaining security and staying ahead of potential threats. This is where OSINT (Open Source Intelligence) comes into play, emerging as a pivotal tool in improving productivity and expediting the time it takes to address vulnerabilities. In this…
Read MoreTop 10 Resources for Learning Artificial Intelligence and Machine Learning in Cybersecurity
Artificial intelligence (AI) and machine learning (ML) are revolutionizing the field of cybersecurity. With the increasing complexity and frequency of cyber threats, organizations are turning to AI and ML to bolster their defense strategies. Whether you’re a cybersecurity professional or an aspiring enthusiast, staying updated with the latest advancements in AI and ML is crucial.…
Read MoreSpeed Up Remediation of CVE-2023-27350
Cybersecurity practitioners face the daunting task of keeping up with the latest vulnerabilities and exploits that constantly threaten the security of their organization’s networks and systems. The process of identifying and remediating vulnerabilities can be time-consuming, complex, and costly. However, with the advent of AI-powered cybersecurity intelligence platforms like The Security Bulldog, organizations can speed…
Read MoreThe Importance of Machine Learning in Cybersecurity: The Security Bulldog, Metasploit, Wireshark and nmap
In today’s fast-paced and constantly evolving digital world, cyber threats are a significant concern for both individuals and organizations. It is essential to have a robust cybersecurity infrastructure in place to protect against these threats and minimize the damage they can cause. This article will discuss The Security Bulldog, a machine learning cybersecurity intelligence platform,…
Read MoreThe Security Bulldog: A Proprietary Machine Learning Solution that Streamlines Cybersecurity Operations and Saves Time and Money
Cybersecurity is a constant battle for many organizations, with the problem of wasting time and money being a common issue. Teams wake up in the morning having to figure out what broke, assess its impact on their operations, and find ways to fix it. This can be time-consuming and stressful, but The Security Bulldog is…
Read MoreIs CVE-2022-42889 Important to You? How long does it take to find out?
Is CVE-2022-42889 important to you? You have no idea unless you know this CVE is an Apache Commons Text code injection vulnerability. And…you would only care if you had Apache in your IT environment. And…given the lack of visibility into your open-source software supply chain, that is hard to know. Figuring this out manually would…
Read MoreIndustrial Control Systems Vulnerabilities and The Security Bulldog
Millions of industrial control systems around the world are vulnerable to critical cyberattacks that could result in massive blackouts, according to a new report. The report, released by CISA, identified three industrial control system software vulnerabilities that hackers could exploit. These vulnerabilities can potentially cause significant damage not only to the systems themselves but also…
Read MoreIs CVE-2022-34718 Important to You?
Is CVE-2022-34718 important to you? You have no idea unless you know that this CVE is the Windows TCP/IP Remote Code Execution Vulnerability and you would only care if you had Microsoft in your IT environment. Figuring this out manually would take forever. The good news is that we partnered with cybersecurity professionals to build…
Read MoreHow to find remediation instructions: News to CVE to Microsoft
Sign in to your account first: http://52.23.217.202/wp-login.php No account? Create one here.
Read More