The content discusses the growing presence of Android TV in various devices, including thermostats and cars, suggesting it may be an early stage of a larger trend with significant potential. It highlights the concept of “Android lockdown mode” for cars, indica…
Category: Youtube
The CEO’s communication is crucial for fostering company culture and aligning the organization’s vision. It acts as a unifying force, motivating everyone to work towards common goals. Misalignment in communication can lead to confusion and disruption within th…
Cloudflare’s 2024 DDoS attack statistics reveal a staggering increase in attacks, with 21.3 million incidents recorded, showing a 358% year-over-year rise. In 2025’s first quarter alone, 20.5 million attacks occurred, with a significant number targeting gaming…
Cisco’s senior vice president of AI, DJ SPath, discusses the company’s comprehensive approach to AI, emphasizing their unique position across the entire tech stack, including custom silicon and networking solutions. The focus is on the significance of networki…
This content shares a personal experience related to Governance, Risk Management, and Compliance (GRC) within an organizational context, highlighting themes of uncertainty, the importance of a structured framework, and the decision-making challenges regarding …
This content outlines the top five essential skills for becoming a cyber security analyst, emphasizing the importance of SOC fundamentals, vulnerability management, cloud security, regulatory compliance, and identity/access management. It also advises on vario…
This content discusses the concept of “slop squatting,” a malicious practice similar to typo-squatting, particularly in contexts like npm and VS Code plugins. It highlights the ease with which AI can be misled and addresses concerns around the accuracy of AI o…
Security metrics continue to be a significant challenge for many organizations, regardless of their focus areas such as security operations or managed security service providers. Despite advancements in technology, there remains a gap in effectively translatin…
At RSA 25, the focus is on the emergence of securing Agentic AI, highlighted by predictions that its deployment will rise significantly in the coming years. Joe Peterson from Clarify 360 emphasizes the distinction of Agentic AI from traditional models, noting …
This content discusses a security concern where Microsoft Word can execute PowerShell commands, indicating a possible hack. It introduces Threat Locker Ring Fencing as a solution to prevent unauthorized interactions between applications. By implementing these …
This content discusses a cybersecurity competition environment involving interviews with participants and directors from various universities, focusing on the educational aspects and resource requirements for competing in cybersecurity events. It emphasizes th…
Effective communication is crucial for leadership success, and it’s important to be aware of personal blind spots in messaging. Engaging communication specialists can help refine and soften messages for better understanding. Leaders should recognize the value …
This content discusses the concept of a model functioning as a next-token prediction system, where generating more tokens can lead to better answers. It highlights the value of a “thinking mode” in answering complex questions, contrasting it with straightforwa…
During RSA 25, Patrick Coughlin from Cisco highlighted key customer insights regarding the integration of AI in security operations centers (SOCs). The focus is on the impact of AI on attackers, its role in enterprise operations, and its application for enhanc…
JustHacking.com offers hands-on cyber security training led by industry experts, featuring courses, free upskill challenges, interactive lab environments, and bimonthly live streams to enhance your skills. With an emphasis on practicality and affordability, le…