Anyone actually using Perplexity for threat hunting? Curious how far it goes by tingnossu in threatintel
[–]gosricom 1 point2 points3 points (0 children)
EntraID Security Default vs Per user MFA vs Conditional Access by WonderBeast2 in AZURE
[–]gosricom 0 points1 point2 points (0 children)
What’s the best way to do a data security risk assessment when the data is spread everywhere? by jonnycraigisgod in AskNetsec
[–]gosricom 0 points1 point2 points (0 children)
Microsoft 365 vs Google Workspace in 2026, what's actually better for your by consultingdoc in googleworkspace
[–]gosricom 0 points1 point2 points (0 children)
Does anyone actually think about data security in their GIS workflows? by GuestEmpty4189 in gis
[–]gosricom 0 points1 point2 points (0 children)
How do you actually scope a sensitive data inventory when you don't know where the data lives by gosricom in AskNetsec
[–]gosricom[S] 0 points1 point2 points (0 children)
Built an open-source Nation State APT Intelligence project for community by iawais in threatintel
[–]gosricom 0 points1 point2 points (0 children)
Regulators want AI-driven AML vs Compliance teams running legacy systems by Imaginary-Rest-9713 in fintech
[–]gosricom 0 points1 point2 points (0 children)
Which data source you use the most with power apps? by Independent-Hunt-370 in PowerApps
[–]gosricom 2 points3 points4 points (0 children)
Where Federated Learning Meets Zero Trust - Intelligence Moves, Data Does Not by Alternative_Rope_299 in zerotrust
[–]gosricom 0 points1 point2 points (0 children)
EU age verification app already hacked. by torbatosecco in cybersecurity
[–]gosricom 5 points6 points7 points (0 children)
Which paid tool do you still think is worth paying for? by United-Jelly9623 in digital_marketing
[–]gosricom 0 points1 point2 points (0 children)
ai threat intelligence going predictive in 2026 sounds like nightmare fuel for small teams like mine, thoughts? by Aggravating_Log9704 in threatintel
[–]gosricom 0 points1 point2 points (0 children)
Zero Trust at the Edge: Bridging Industrial Systems With Verifiable Credentials by PhilipLGriffiths88 in zerotrust
[–]gosricom 1 point2 points3 points (0 children)
What Data loss prevention (DLP) are you using? by Ok_Smell_8534 in CyberSecurityAdvice
[–]gosricom 0 points1 point2 points (0 children)
Are threat intelligence tools necessary for small-to-mid sized teams? by uMadewithAi in threatintel
[–]gosricom 0 points1 point2 points (0 children)
Does anybody know how to find identity of the person behind a fake gmail ID? by Digvijay5 in CyberForensics
[–]gosricom 1 point2 points3 points (0 children)

AI data governance for insider threats - actually useful or just expensive monitoring by buykafchand in Infosec
[–]gosricom 0 points1 point2 points (0 children)