It takes AI to catch AI, AI in Layers, CMMC changes, fuzzing prompts for better chatbot security, Yale prof on AI evolution, MS's agent plans & more in the new Up Times newsletter at https://bryl.us/k00#worcesterIT#newenglandtech#ITnewsletter
Cory Doctorow reminds us: better privacy protections are good no matter our politics: less data collected means less risk. Same principle as data governance: keeping only the data your co needs reduces liability ... #privacy#datasecurityhttps://bryl.us/lkz
The Louvre's crown-jewel thieves went for specific vulnerabilities using tactics found in cybercrime. What're your crown jewels? Client info? IP? Finances? Knowing what matters most is the first part of defense ... [10 m read/audio] https://bryl.us/101#louvreheist#cybercrime
Download Bryley's report, The Cost of Outsourced IT, available with no obligation. Costs depend on your business size, industry, other factors. This guide can help you have a productive conversation with any provider … https://bryl.link/ozk#outsourcedit#newenglandit
We hear about large breaches. Smaller organizations get attacked too, but their troubles often go unreported. Learn 6 critical ways to make your organization not worth the trouble to cybercriminals. https://bryl.link/gyw#cybersecurity#smallbusiness
Read Up Times by Bryley newsletter November edition – Lessons from the Louvre, The Cost of Outsourced IT report and more New England tech security and network-related info ... https://bryl.link/ifk#newenglandtech#newenglandit
The AI behind M365 Copilot may be changing (OpenAI is working on independence from MS). Monitor your data handling: on whose servers does your data reside? Review your Copilot configuration, see that safeguards are in place ... [5 min] https://bryl.link/ogv#m365#datagovernance
Meta’s updated User Agreement lets it target ads based on users’ interactions with its AI. The FTC has shown collected data is liberally shared with third parties – far beyond users’ understanding ... [3 min read] https://bryl.link/wj9#privacy#dataprivacy
The goal is resilience, per MIT Sloan. Cybersecurity works best when an organization has whole company buy-in to evade the criminal activity that ends 60% of smaller businesses ... [7 min read] https://bryl.link/aic#cybersecurity#uptime
Cataloging your networked equipment like connected machinery, sensors and control systems is an important step in cyber-defenses and can help improve incident response for better uptime, per new CISA guidance ... https://bryl.link/lmj [3 min read] #cybersecurity