ByteMe

  • ChatGPT Learning Possibilities

    …and ways people can take advantage of this new artificial intelligence. I’ve been hearing a lot about ChatGPT and I wanted to explore more of what it can do. I wanted to see how easy it was to use myself. I created a user account and typed in my prompt: write an information article about

    read more

  • Software Bill of Materials (SBOM)

    A software bill of materials (SBOM) is a comprehensive list of all the individual components that make up a piece of software. This list includes both the source code and any external libraries or other dependencies that are necessary for the software to function properly. Having an SBOM is important for several reasons. First, it

    read more

  • Books about cybercrime

    A guardian article was recently published covering the top 10 cybercrime books. What they didn’t do is rank them with any third-party data. Below I’m putting those 10 books plus another with their goodreads rankings (0-5 being the best), to help me, and maybe you, choose the right book to start reading first. Book Rating

    read more

  • Cybersecurity Articles | Week of October 24, 2022

    TechCrunch, Inside TheTruthSpy, the Stalkerware network spying on thousands by Zach Whittaker (Oct 26) | A database containing about 360,000 unique android devices exposed. TechCrunch, Hive Ransomware gang leaks data stolen during Tata Power cyberattack by Carly Page, Jagmeet Singh (Oct 25) | Tata Power, which serves more than 12 million customers through its distributors,

    read more

  • Great Recent Articles

    Nature: Why scientists are turning to Rust by Jeffrey M. Perkel (Dec 11, 2020) Why this is interesting. RUST is seen as more secure than other older programming languages. The Trade Secrets Network: Struggles with Insider Risk Program Stakeholders by Stacey Champagne (Sep 9) Bleeping Computer: Web browser app mode can be abused to make

    read more

  • Verizon Data Breach Reports

    Full disclosure I work for Verizon. Regardless of that fact, these are information packed reports that I found fascinating. All reports – list of cool stuff to browse through. Data Breach Investigations Report (DBIR) – THE report that analyzes the threat landscape. It tells the story of what is happening with data breaches across industries.

    read more

  • Star Trek & Cybersecurity

    These two things together. Take my money! Hacker’s Movie Guide: The Complete List of Hacker and Cybersecurity Movies by Steven C. Morgan, Connor S. Morgan

    read more

  • Insider Threats: Building a repository of past incidents

    This came up when it was mentioned to me a data dictionary for insider threats. Coming from data governance I had only considered these being about databases, tables and columns, when this was more about building a library of information around past incidents so that information can be used to help with insider threats in

    read more

  • Homomorphic Encryption

    This is the best video I could find on the subject and I’m still not sure I really get it. But it seems complicated so I don’t feel that bad. I’ll post more as I learn more.

    read more