Tag: practical security

  • Microsoft Security Blog: Securing agentic AI: Your guide to the Microsoft Ignite sessions catalog

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/10/09/securing-agentic-ai-your-guide-to-the-microsoft-ignite-sessions-catalog/ Source: Microsoft Security Blog Title: Securing agentic AI: Your guide to the Microsoft Ignite sessions catalog Feedly Summary: ​Security is a core focus at Microsoft Ignite 2025, reflected in dedicated sessions and hands-on experiences designed for security professionals and leaders. Take a look at the session catalog. The post Securing agentic AI:…

  • Microsoft Security Blog: New Microsoft Secure Future Initiative (SFI) patterns and practices: Practical guides to strengthen security

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/10/07/new-microsoft-secure-future-initiative-sfi-patterns-and-practices-practical-guides-to-strengthen-security/ Source: Microsoft Security Blog Title: New Microsoft Secure Future Initiative (SFI) patterns and practices: Practical guides to strengthen security Feedly Summary: Microsoft Secure Future Initiative (SFI) patterns and practices are practical, actionable, insights from practitioners for practitioners based on Microsoft’s implementation of Zero Trust through the Microsoft Secure Future Initiatives. By adopting these patterns, organizations can accelerate their…

  • Microsoft Security Blog: Sharing practical guidance: Launching Microsoft Secure Future Initiative (SFI) patterns and practices

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/08/06/sharing-practical-guidance-launching-microsoft-secure-future-initiative-sfi-patterns-and-practices/ Source: Microsoft Security Blog Title: Sharing practical guidance: Launching Microsoft Secure Future Initiative (SFI) patterns and practices Feedly Summary: We’re excited to launch SFI patterns and practices: a new library of actionable guidance designed to help organizations implement security measures at scale. This launch marks a next step in our journey to…

  • Cisco Security Blog: Foundation-sec-8B-Instruct: An Out-of-the-Box Security Copilot

    Source URL: https://feedpress.me/link/23535/17112350/foundation-sec-8b-instruct-out-of-the-box-security-copilot Source: Cisco Security Blog Title: Foundation-sec-8B-Instruct: An Out-of-the-Box Security Copilot Feedly Summary: Foundation-sec-8B-Instruct layers instruction fine-tuning on top of our domain-focused base model, giving you a chat-native copilotthat understands security. AI Summary and Description: Yes Summary: The text describes a new method of fine-tuning AI models, specifically designed for security applications. This…

  • Cloud Blog: Your guide to Google Cloud Security at Black Hat USA 2025

    Source URL: https://cloud.google.com/blog/products/identity-security/your-guide-to-google-cloud-security-at-black-hat-usa-2025/ Source: Cloud Blog Title: Your guide to Google Cloud Security at Black Hat USA 2025 Feedly Summary: At Google Cloud Security, our mission is to empower organizations to strengthen their defenses with innovative security capabilities, all while simplifying and modernizing their cybersecurity. In a world of evolving threats and increasing complexity, we…

  • Cloud Blog: Cloud CISO Perspectives: How Google secures AI Agents

    Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-how-google-secures-ai-agents/ Source: Cloud Blog Title: Cloud CISO Perspectives: How Google secures AI Agents Feedly Summary: Welcome to the first Cloud CISO Perspectives for June 2025. Today, Anton Chuvakin, security advisor for Google Cloud’s Office of the CISO, discusses a new Google report on securing AI agents, and the new security paradigm they demand.As…

  • Hacker News: How to prove false statements? (Part 1)

    Source URL: https://blog.cryptographyengineering.com/2025/02/04/how-to-prove-false-statements-part-1/ Source: Hacker News Title: How to prove false statements? (Part 1) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text delves into the implications of theoretical models in cryptography, particularly focusing on the random oracle model (ROM) and its impact on the practical security of cryptographic schemes. It emphasizes the…