Explore
Curator's Pick
Login
Sign up
neoxian
proofofbrain
stem
technology
science
stemgeeks
hive-196387
palnet
cent
inleo
hive-167922
spanish
pob
waivio
ctp
vyb
stemsocial
hive-engine
creativecoin
gems
pimp
ocd
archon
health
blog
stemng
hive
photography
appreciator
chessbrothers
math
education
freecompliments
entropia
hive-163521
ecency
stem-espanol
nature
hive-128780
photofeed
#risk
Trending Posts
@tarazkp
0
11 months ago
LeoFinance
The AI of Trolling
A friend linked me an interesting article today about a lawyer who used ChatGPT to supplement a submission for a case her was defending, citing cases that the AI recommended. The…
@mrosenquist
0
10 months ago
STEMGeeks
Applying a Cybersecurity Threat Agent Risk Assessment to Healthcare
There are many approaches to conduct a strategic cybersecurity risks assessment. This is one of my favorite ways, using a Threat Agent Risk Assessment (TARA) methodology. This paper was authored b
@shainemata
0
6 months ago
ai
The Impact of AI on our Future Lifestyles: Risks and Considerations
Artificial Intelligence (AI) is become an increasingly integral part of our lives, shaping our interactions and experiences in many ways. Even if we do not use AI directly, it is…
@mrosenquist
0
4 months ago
cybersecurity
The Cybersecurity Vault - Now is the Time to Improve Cybersecurity Metrics
We are doing cybersecurity metrics wrong! There are better ways and my guest Rick Howard, the CSO at N2K and longtime cybersecurity metrics expert, provides insights into how…
@jorgebgt
0
3 months ago
Proof of Brain
The real threat of an asteroid Asteroid 2007 FT3
The real threat of an asteroid Asteroid 2007 FT3 There are four different questions raised regarding A
@mrosenquist
0
about 2 months ago
cybersecurity
Best Practices in Securing 3rd Party Supply-Chain with Cassie Crossley
The Cybersecurity Vault episode 28 Securing the software supply chain, including 3rd party vendors and suppliers, is a difficult problem that the cybersecurity industry is…
Menu
Explore
Curator's Pick
Trade
Trade STEM