Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
Cybersecurity: Essential for Our AI Future – Let’s Understand Why
The Rise of Artificial Intelligence Artificial intelligence (AI) systems are highly developed computer programs that mimic and outperform human intelligence in terms of learning and decision-making, but they do so remarkably quickly and accurately. AI learns by...
Artificial Intelligence Security: Defending Against Emerging Cyber Threats
Artificial Intelligence (AI)Artificial intelligence is the design of a computer, computer-controlled robots, or software that tries to replicate the human intellect. AI is developed through the study of brain cognition, which includes the distribution of knowledge,...
Security Concerns of Hidden Permissions in SharePoint
SharePoint is a stalwart of collaboration and file sharing in Microsoft 365 which started its life as SharePoint server back in 2001. Most organizations use SharePoint online as hosted by Microsoft and it’s become a “plumbing” technology – something that’s...
Monthly Threat Report May 2024: Satya Nadella’s Statement on Security, and a New UK Law Impacting the Industry
AI in Cybersecurity: How Large Language Models Are Changing the Threat Landscape
Since late 2022, we’ve seen a dramatic rise of Large Language Models (LLMs) based AI in the form of ChatGPT (Generative Pre-trained Transformer) and its cousins. There’s been quite a lot written about how these tools will impact cyber security. In Hornetsecurity's...
What Your Employees Need to Know About Phishing + Real-Life Examples
In this article, we’ll present a series of real-world phishing emails, with personal details altered or obfuscated to protect the innocent. These are useful for training users to spot the clues that something is trying to trick them, so feel free to use these in your...
Unmasking Phishing: Understanding the Insidious Threat to Your Organization
In this article, we delve into the pervasive threat of phishing and its profound implications for organizational security. Phishing, an ever-evolving tactic employed by cybercriminals, continues to pose a significant risk to businesses worldwide. From impersonating...
How to Mitigate IT Security Risks: Best Practices for Effective Risk Management
Do you work in Cybersecurity? Guess what – your job is actually risk management. Is your role in general IT, or in sales, marketing, HR or management? Guess what – your job isn’t risk management, but a part of your role should be dedicated to risk management. Why, you...