Join us

heart Posts from the community tagged with cybersecurity...
Sponsored Link
@faun shared a link, 1 year, 1 month ago

The art and science of developing intelligent apps with OpenAI GPT-3, DALL·E 2, CLIP, and Whisper.

Explore the fascinating world of Artificial Intelligence and solve real-world problems!

In this practical guide, you will build intelligent real-world applications using GPT-3, DALL-E, Whisper, CLIP, and more tools from the OpenAI and ML ecosystem.

Rest assured, you don't need to be a data scientist or machine learning engineer to follow this guide!

The art and science of developing intelligent apps with OpenAI GPT-3, DALL·E 2, CLIP, and Whisper.
Story BridgeCrew Team
@bridgecrewio shared a post, 2 years, 2 months ago

Vulnerabilities vs. Security Misconfigurations: An Essential Primer

When you hear the term “security breach,” chances are that risks like malware or ransomware attacks come to mind. These exploits tend to feature in headlines about major cybersecurity attacks.

Screen Shot 2022-01-27 at 1.26.23 PM.png
Story
@adetomiwaj shared a post, 2 years, 2 months ago

Methodology for Malware Static analysis: Portable Executable (PE) files

Malware analysis determines if a program/file is malicious. There are two phases in malware analysis.

1_NX4Ji7IweLK4Oth9kJGscA.png
Story
@cyberpotato shared a post, 2 years, 3 months ago

Four Questions Your Information Security Team Should be Asking

The key to succeeding in information security and cyber threat intelligence is recognizing what you’re dealing with, and adapting accordingly.

1_ww3Fn4Y9jar-G1now-2reg.jpeg
Story
@kyle_hemsley shared a post, 2 years, 4 months ago

Securing Microsoft Azure AD with FIDO2 Keys — Passwordless Authentication

Azure AD is a powerful cloud-based IdP from Microsoft that many organizations have “free” access to through their M365 subscriptions for Office 365 / Exchange Online.

0_5PbNRd5eaElf5giZ.jpeg
Story
@thecybermutt shared a post, 2 years, 4 months ago

Deciphering A Caesar Cipher with Python

Caesar ciphers map out characters to other characters based on a number key chosen by the designer of the Caesar cipher.