#operational-security

[ follow ]
Artificial intelligence
fromcointelegraph.com
2 days ago

How to use Google's Gemini to research coins before you invest

Gemini augments crypto research by organizing and synthesizing large information sets as a co-pilot, but it is not a financial adviser or real-time price oracle.
UK news
fromTheregister
2 weeks ago

MI6 upgrades dark web portal to recruit new spies

MI6 launched Silent Courier, a Tor-accessible dark web portal and published security guidance to enable secure contact and recruit foreign informants worldwide.
Privacy technologies
fromWIRED
2 weeks ago

How to Set Up and Use a Burner Phone

Use a cash-bought, frequently rotated prepaid burner phone, isolated from personal accounts, to separate identity from device and reduce location and data tracking.
California
fromThe Oaklandside
3 weeks ago

OPD's decision to encrypt its radio feeds caught city officials by surprise

The Oakland Police Department is encrypting radio and dispatch channels, removing public access to live police communications.
Information security
fromSecuritymagazine
1 month ago

In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Economic pressures and high inflation are increasing property-related crime, exposing operational sites to theft and requiring proactive security measures to protect assets and revenue.
fromSecuritymagazine
1 month ago

Take a Look Inside: Managing and Mitigating Insider Risk

All individuals with access to or knowledge of an organization's computers, networks, facilities, information, or personnel are potential insider threats, including vendors and contractors. The ability to intentionally use or accidentally misuse any of this information can breach confidentiality, reveal trade secrets, cause a data security incident, or harm an organization's personnel, ultimately impacting its reputation and ability to do business.
Information security
#cybercrime
#cybersecurity
fromThe Hacker News
3 months ago
Artificial intelligence

OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups

OpenAI identified and banned accounts used by threat actors for developing malware and social media manipulation.
fromemptywheel
5 months ago
Digital life

Whiskey Pete's Dirty Desktop - emptywheel

Pete Hegseth's operational security is critically weak, posing risks to sensitive information.
Cryptocurrency
fromBitcoin Magazine
4 months ago

9 Of The Best Bitcoin Consultants To Improve Your Knowledge, Enhance Your OPSEC And Secure Your Bitcoin

Bitcoin requires individuals to take full responsibility for asset protection, emphasizing the need for operational security and adept guidance.
fromComputerWeekly.com
5 months ago

Signalgate: Learnings for CISOs securing enterprise data | Computer Weekly

Sensitive data loss episodes can have reputational, financial, legal, and regulatory consequences. CISOs need to have their data leakage defences and best practices in place.
Privacy professionals
US politics
fromFuturism
5 months ago

The Head of the Pentagon Has Been Using His Personal Phone for Sports Betting and Sharing Military Secrets

Defense Secretary Pete Hegseth's use of a personal phone for classified communications has raised major national security concerns.
[ Load more ]