Your MOM would fall for audio deepfakes.
And, well, you probably would too.
In fact, your whole company might be tricked by voice cloning.
Read more on the Kolide blog: https://www.kolide.com/blog/how-audio-deepfakes-trick-employees-and-moms
Device security that completes your Zero Trust picture. Built for Okta, powered by Honest Security.
Follow us at our main Mastodon account: https://mastodon.social/@kolide
| Website | https://www.kolide.com/ |
| Blog | https://www.kolide.com/blog |
| Mastodon (Main) | Follow us at our main Mastodon account: https://mastodon.social/@kolide |
| Youtube | https://www.youtube.com/@kolidecybersecurity |
Your MOM would fall for audio deepfakes.
And, well, you probably would too.
In fact, your whole company might be tricked by voice cloning.
Read more on the Kolide blog: https://www.kolide.com/blog/how-audio-deepfakes-trick-employees-and-moms
"I think, fundamentally, we have to wake up as an IT/Security apparatus." - Jason Meller, Kolide CEO
Jason Meller joined the Smashing Security podcast, listen now: https://www.smashingsecurity.com/347-trolls-military-data-and-the-hitman-and-her/
A woman's attempt to hire an assassin online backfires badly, it's scary just how cheap it is to buy information about US military personnel, and trolls and tattoos don't mix. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans
"At the end of the day Zero Trust is about ensuring not just the correct user is signing in, but device trust, making sure they're using the correct laptop." - Jason Meller, Kolide CEO
Jason Meller joined the the CyberWire podcast with Dave Bittner to discuss all things Shadow IT, listen now: https://thecyberwire.com/podcasts/daily-podcast/1949/notes
Cyber safety for the holidays. Using regulatory risk to pressure a ransomware victim. A call for regulatory action against a supply chain threat. Rhysida malware: a warning and a description. Extending local breaches in Google Workspace. Protestware in open-source products. GRU's Sandworm implicated in campaign against Danish electrical power providers. Jason Meller, Founder & CEO of Kolide joins us as part of our sponsored Industry Voices segment to discuss the findings from The Shadow IT Report. In this Threat Vector segment, David Moulton sits down with Sama Manchanda, a consultant at Unit 42 to discuss the fascinating world of social engineering attacks. And donation scams: exploiting sympathy.
"It's easier to get things done at a smaller company."
The go-to mantra for startups is usually move fast and break things, but for Watershed, it's move fast and secure things.
Watch our CEO Jason Meller's recent talk with Jesse Kriss of Watershed. https://www.kolide.com/blog/watershed-thinks-big-to-keep-a-small-team-secure
Okay, in truth, this recent hashtag game on Mastodon may be too stupid for a company account, but we HAD to.
We’re mourning the loss of Omegle today. There’s a lot of food for thought in creator Leif K-Brooks’ official sign-off (it’s wild that he started the site at age 18). For now, we’ll share his call to “...please consider donating to the Electronic Frontier Foundation, an organization that fights for your rights online.”
We see a lot of people talking about the product announcements from OpenAI's DevDay. But why isn’t anyone talking about how OpenAI decided to handle the whole “copyright” issue?
Paying the legal fees of business users seems like a wild way to put people at ease about using it in the workplace (which hey, we wrote more about on the Kolide blog: https://www.kolide.com/blog/89-of-workers-use-ai-far-fewer-understand-the-risks).
Kolide CEO Jason Meller joined the Smashing Security podcast with Carole Theriault to talk about our new Shadow IT report. They covered:
📱 The dangers of personal devices
📝 What counts as "high risk" apps
💻 How WFH changed user behaviors
It's a great conversation!
Listen here: https://www.smashingsecurity.com/347-trolls-military-data-and-the-hitman-and-her/
A woman's attempt to hire an assassin online backfires badly, it's scary just how cheap it is to buy information about US military personnel, and trolls and tattoos don't mix. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans
It seems like the regulatory obligations of cybersecurity shift every week. But the ethics never change: people deserve to be safe without sacrificing an inordinate amount of privacy.
This article makes an excellent point about why cybersecurity pros everywhere should be concerned about The EU’s Article 45 and what it could mean for the privacy of the internet at large.
For throwback Thursday, we’re thinking fondly of this piece from CEO Jason Meller, which seems oddly prescient as companies decide how to use AI...
"For some, a tool like Grammarly is just a nice-to-have capability that allows them to write more professionally. Still, for others, it’s an essential tool that will enable them to do something they could not do by themselves."
https://www.kolide.com/blog/is-grammarly-a-keylogger-what-can-you-do-about-it