Groups
Groups
Sign in
Groups
Groups
Technical - Security
Conversations
About
Send feedback
Help
Technical - Security
1–30 of 15481
Mark all as read
Report group
0 selected
Eyal Estrin
Apr 3
Data Security Risks of Using Foreign-Developed Mobile Apps in the United States (I-033126-PSA)
https://www.ic3.gov/PSA/2026/PSA260331 Eyal Estrin Author | Cloud Architect | AWS • Azure • GCP
unread,
Data Security Risks of Using Foreign-Developed Mobile Apps in the United States (I-033126-PSA)
https://www.ic3.gov/PSA/2026/PSA260331 Eyal Estrin Author | Cloud Architect | AWS • Azure • GCP
Apr 3
Eyal Estrin
Apr 2
The Cybersecurity Trust Reality in 2026
https://www.sophos.com/en-us/blog/the-cybersecurity-trust-reality-in-2026 Eyal Estrin Author | Cloud
unread,
The Cybersecurity Trust Reality in 2026
https://www.sophos.com/en-us/blog/the-cybersecurity-trust-reality-in-2026 Eyal Estrin Author | Cloud
Apr 2
Eyal Estrin
Apr 2
Security awareness is not a control: Rethinking human risk in enterprise security
https://www.csoonline.com/article/4152631/security-awareness-is-not-a-control-rethinking-human-risk-
unread,
Security awareness is not a control: Rethinking human risk in enterprise security
https://www.csoonline.com/article/4152631/security-awareness-is-not-a-control-rethinking-human-risk-
Apr 2
Eyal Estrin
Apr 2
Cloud CISO Perspectives: RSAC '26: AI, security, and the workforce of the future
https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-rsac-26-ai-security-
unread,
Cloud CISO Perspectives: RSAC '26: AI, security, and the workforce of the future
https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-rsac-26-ai-security-
Apr 2
Eyal Estrin
Apr 2
The State of Trusted Open-Source Report
https://thehackernews.com/2026/04/the-state-of-trusted-open-source-report.html Eyal Estrin Author |
unread,
The State of Trusted Open-Source Report
https://thehackernews.com/2026/04/the-state-of-trusted-open-source-report.html Eyal Estrin Author |
Apr 2
Eyal Estrin
Apr 2
Attackers aren’t Breaking in Anymore, they’re Logging in
https://www.ontinue.com/resource/blog-ontinue-2h-2025-threat-intel-report/ Eyal Estrin Author | Cloud
unread,
Attackers aren’t Breaking in Anymore, they’re Logging in
https://www.ontinue.com/resource/blog-ontinue-2h-2025-threat-intel-report/ Eyal Estrin Author | Cloud
Apr 2
Eyal Estrin
Apr 1
Scope Security Assessments for Attack Paths, Not Org Charts
https://zeltser.com/security-assessment-scope Eyal Estrin Author | Cloud Architect | AWS • Azure •
unread,
Scope Security Assessments for Attack Paths, Not Org Charts
https://zeltser.com/security-assessment-scope Eyal Estrin Author | Cloud Architect | AWS • Azure •
Apr 1
Eyal Estrin
Apr 1
Shor’s algorithm is possible with as few as 10,000 reconfigurable atomic qubits
https://arxiv.org/pdf/2603.28627 Eyal Estrin Author | Cloud Architect | AWS • Azure • GCP Insights
unread,
Shor’s algorithm is possible with as few as 10,000 reconfigurable atomic qubits
https://arxiv.org/pdf/2603.28627 Eyal Estrin Author | Cloud Architect | AWS • Azure • GCP Insights
Apr 1
Eyal Estrin
Mar 31
Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations
https://quantumai.google/static/site-assets/downloads/cryptocurrency-whitepaper.pdf Eyal Estrin
unread,
Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations
https://quantumai.google/static/site-assets/downloads/cryptocurrency-whitepaper.pdf Eyal Estrin
Mar 31
Eyal Estrin
Mar 28
8 steps CISOs can take to empower their teams
https://www.csoonline.com/article/4148286/8-steps-cisos-can-take-to-empower-their-teams.html Eyal
unread,
8 steps CISOs can take to empower their teams
https://www.csoonline.com/article/4148286/8-steps-cisos-can-take-to-empower-their-teams.html Eyal
Mar 28
Eyal Estrin
Mar 28
Lloyds Bank reveals how IT bug exposed transaction data
https://www.csoonline.com/article/4151343/lloyds-bank-reveals-how-it-bug-exposed-transaction-data.
unread,
Lloyds Bank reveals how IT bug exposed transaction data
https://www.csoonline.com/article/4151343/lloyds-bank-reveals-how-it-bug-exposed-transaction-data.
Mar 28
Eyal Estrin
Mar 28
Cloud Phones: The Invisible Threat
https://www.group-ib.com/blog/cloud-phones-invisible-threat/ Eyal Estrin Author | Cloud Architect |
unread,
Cloud Phones: The Invisible Threat
https://www.group-ib.com/blog/cloud-phones-invisible-threat/ Eyal Estrin Author | Cloud Architect |
Mar 28
Eyal Estrin
Mar 28
The CISO’s guide to responding to shadow AI
https://www.csoonline.com/article/4143302/the-cisos-guide-to-responding-to-shadow-ai.html Eyal Estrin
unread,
The CISO’s guide to responding to shadow AI
https://www.csoonline.com/article/4143302/the-cisos-guide-to-responding-to-shadow-ai.html Eyal Estrin
Mar 28
Eyal Estrin
Mar 26
Omnissa State of Digital Workspace 2026 report
https://www.omnissa.com/insights/Omnissa-State-of-Digital-Workspace-2026-press-release/ Eyal Estrin
unread,
Omnissa State of Digital Workspace 2026 report
https://www.omnissa.com/insights/Omnissa-State-of-Digital-Workspace-2026-press-release/ Eyal Estrin
Mar 26
Eyal Estrin
Mar 26
Strava’s Fitness App Exposed the Real-Time Location of a French Aircraft Carrier
https://gizmodo.com/stravas-fitness-app-exposed-the-real-time-location-of-a-french-aircraft-carrier-
unread,
Strava’s Fitness App Exposed the Real-Time Location of a French Aircraft Carrier
https://gizmodo.com/stravas-fitness-app-exposed-the-real-time-location-of-a-french-aircraft-carrier-
Mar 26
Eyal Estrin
Mar 26
ForeScout - The Riskiest Devices of 2026
https://www.forescout.com/resources/riskiest-devices-2026-report/ Eyal Estrin Author | Cloud
unread,
ForeScout - The Riskiest Devices of 2026
https://www.forescout.com/resources/riskiest-devices-2026-report/ Eyal Estrin Author | Cloud
Mar 26
Eyal Estrin
Mar 26
Personal cyberattacks against executives are rising. Here's why - and how to stop them
https://cloud.google.com/transform/personal-cyberattacks-against-executives-are-rising-heres-how-to-
unread,
Personal cyberattacks against executives are rising. Here's why - and how to stop them
https://cloud.google.com/transform/personal-cyberattacks-against-executives-are-rising-heres-how-to-
Mar 26
Eyal Estrin
Mar 26
Security for the Quantum Era: Implementing Post-Quantum Cryptography in Android
https://security.googleblog.com/2026/03/post-quantum-cryptography-in-android.html Eyal Estrin Author
unread,
Security for the Quantum Era: Implementing Post-Quantum Cryptography in Android
https://security.googleblog.com/2026/03/post-quantum-cryptography-in-android.html Eyal Estrin Author
Mar 26
Eyal Estrin
Mar 26
The Kill Chain Is Obsolete When Your AI Agent Is the Threat
https://thehackernews.com/2026/03/the-kill-chain-is-obsolete-when-your-ai.html Eyal Estrin Author |
unread,
The Kill Chain Is Obsolete When Your AI Agent Is the Threat
https://thehackernews.com/2026/03/the-kill-chain-is-obsolete-when-your-ai.html Eyal Estrin Author |
Mar 26
Eyal Estrin
Mar 26
‘Do not shift budgets to AI’: How businesses should and shouldn’t respond to evolving threats
https://www.cybersecuritydive.com/news/ai-cyberattacks-changes-defense-offense-strategies/815716/
unread,
‘Do not shift budgets to AI’: How businesses should and shouldn’t respond to evolving threats
https://www.cybersecuritydive.com/news/ai-cyberattacks-changes-defense-offense-strategies/815716/
Mar 26
Eyal Estrin
Mar 26
Threat Brief: Recruiting Scheme Impersonating Palo Alto Networks Talent Acquisition Team
https://unit42.paloaltonetworks.com/phishing-attackers-pose-as-panw-recruiters/ Eyal Estrin Author |
unread,
Threat Brief: Recruiting Scheme Impersonating Palo Alto Networks Talent Acquisition Team
https://unit42.paloaltonetworks.com/phishing-attackers-pose-as-panw-recruiters/ Eyal Estrin Author |
Mar 26
Eyal Estrin
Mar 26
M-Trends 2026: Data, Insights, and Strategies From the Frontlines
https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2026 Eyal Estrin Author | Cloud
unread,
M-Trends 2026: Data, Insights, and Strategies From the Frontlines
https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2026 Eyal Estrin Author | Cloud
Mar 26
Eyal Estrin
Mar 26
Gcore Radar Q3–Q4 2025: three insights into an accelerating threat landscape
https://gcore.com/blog/radar-q3-q4-2025-insights Eyal Estrin Author | Cloud Architect | AWS • Azure •
unread,
Gcore Radar Q3–Q4 2025: three insights into an accelerating threat landscape
https://gcore.com/blog/radar-q3-q4-2025-insights Eyal Estrin Author | Cloud Architect | AWS • Azure •
Mar 26
Eyal Estrin
Mar 25
US regulator bans imports of new foreign-made routers, citing security concerns
https://www.reuters.com/sustainability/boards-policy-regulation/fcc-banning-imports-new-chinese-made-
unread,
US regulator bans imports of new foreign-made routers, citing security concerns
https://www.reuters.com/sustainability/boards-policy-regulation/fcc-banning-imports-new-chinese-made-
Mar 25
Eyal Estrin
Mar 25
The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills
https://thehackernews.com/2026/03/the-hidden-cost-of-cybersecurity.html Eyal Estrin Author | Cloud
unread,
The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills
https://thehackernews.com/2026/03/the-hidden-cost-of-cybersecurity.html Eyal Estrin Author | Cloud
Mar 25
Eyal Estrin
Mar 25
AI in the SOC: What Could Go Wrong?
https://www.darkreading.com/cybersecurity-operations/ai-soc-go-wrong Eyal Estrin Author | Cloud
unread,
AI in the SOC: What Could Go Wrong?
https://www.darkreading.com/cybersecurity-operations/ai-soc-go-wrong Eyal Estrin Author | Cloud
Mar 25
Eyal Estrin
Mar 24
NIST SP 800-81r3 - Secure Domain Name System (DNS) Deployment Guide
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81r3.pdf Eyal Estrin Author | Cloud
unread,
NIST SP 800-81r3 - Secure Domain Name System (DNS) Deployment Guide
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81r3.pdf Eyal Estrin Author | Cloud
Mar 24
Eyal Estrin
Mar 23
Your MFA isn’t broken — it’s being bypassed, and your employees can’t tell the difference
https://www.csoonline.com/article/4147134/your-mfa-isnt-broken-its-being-bypassed-and-your-employees-
unread,
Your MFA isn’t broken — it’s being bypassed, and your employees can’t tell the difference
https://www.csoonline.com/article/4147134/your-mfa-isnt-broken-its-being-bypassed-and-your-employees-
Mar 23
Eyal Estrin
Mar 22
Beijing wants its own quantum-resistant encryption standards rather than adopt NIST’s
https://www.csoonline.com/article/4147736/beijing-wants-its-own-quantum-resistant-encryption-
unread,
Beijing wants its own quantum-resistant encryption standards rather than adopt NIST’s
https://www.csoonline.com/article/4147736/beijing-wants-its-own-quantum-resistant-encryption-
Mar 22
Eyal Estrin
Mar 22
Delve accused of misleading customers with ‘fake compliance’
https://techcrunch.com/2026/03/21/delve-accused-of-misleading-customers-with-fake-compliance/ https:/
unread,
Delve accused of misleading customers with ‘fake compliance’
https://techcrunch.com/2026/03/21/delve-accused-of-misleading-customers-with-fake-compliance/ https:/
Mar 22