Tag: NIST
-
Schneier on Security: A Taxonomy of Adversarial Machine Learning Attacks and Mitigations
Source URL: https://www.schneier.com/blog/archives/2025/03/a-taxonomy-of-adversarial-machine-learning-attacks-and-mitigations.html Source: Schneier on Security Title: A Taxonomy of Adversarial Machine Learning Attacks and Mitigations Feedly Summary: NIST just released a comprehensive taxonomy of adversarial machine learning attacks and countermeasures. AI Summary and Description: Yes Summary: The recent publication by NIST of a comprehensive taxonomy regarding adversarial machine learning attacks and corresponding countermeasures…
-
The Register: UK’s first permanent facial recognition cameras installed in South London
Source URL: https://www.theregister.com/2025/03/27/uk_facial_recognition/ Source: The Register Title: UK’s first permanent facial recognition cameras installed in South London Feedly Summary: As if living in Croydon wasn’t bad enough The Metropolitan Police has confirmed its first permanent installation of live facial recognition (LFR) cameras is coming this summer and the lucky location will be the South London…
-
CSA: How Does Continuous Controls Monitoring Improve GRC?
Source URL: https://cloudsecurityalliance.org/articles/how-to-transform-your-grc-with-continuous-controls-monitoring Source: CSA Title: How Does Continuous Controls Monitoring Improve GRC? Feedly Summary: AI Summary and Description: Yes Summary: The text discusses Continuous Controls Monitoring (CCM) as a crucial approach for organizations to enhance their compliance management and risk management strategies amidst increasing regulatory scrutiny and cybersecurity risks. It emphasizes the necessity for…
-
Hacker News: How to protect your phone and data privacy at the US border
Source URL: https://www.theguardian.com/technology/2025/mar/26/phone-search-privacy-us-border-immigration Source: Hacker News Title: How to protect your phone and data privacy at the US border Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides an in-depth discussion on online privacy and security practices, specifically focused on travelers’ encounters with US Customs and Border Protection (CBP). It outlines ways…
-
CSA: Building a Robust Data Security Maturity Model
Source URL: https://cloudsecurityalliance.org/blog/2025/03/26/building-a-robust-data-security-maturity-model Source: CSA Title: Building a Robust Data Security Maturity Model Feedly Summary: AI Summary and Description: Yes **Summary:** The text discusses security maturity models, providing comprehensive insights into how organizations can assess and improve their cybersecurity framework. It emphasizes the importance of data security as part of overall governance, outlines various maturity…
-
Slashdot: Open Source Devs Say AI Crawlers Dominate Traffic, Forcing Blocks On Entire Countries
Source URL: https://tech.slashdot.org/story/25/03/26/016244/open-source-devs-say-ai-crawlers-dominate-traffic-forcing-blocks-on-entire-countries Source: Slashdot Title: Open Source Devs Say AI Crawlers Dominate Traffic, Forcing Blocks On Entire Countries Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the challenges faced by software developers, particularly open source maintainers, in managing aggressive AI crawler traffic that overwhelms their repositories. This scenario underscores the urgent…