David Balaban's profile photo

David Balaban

Amsterdam

Cybersecurity Expert, Journalist, Editor at Freelance

David Balaban is a computer security researcher with over 17 years of experience in malware analysis and antivirus software evaluation.

Featured in: Favicon forbes.com Favicon usatoday.com Favicon engadget.com Favicon acm.org Favicon habr.com Favicon wn.com Favicon cointelegraph.com Favicon patch.com Favicon seekingalpha.com Favicon business2community.com

Articles

  • 1 week ago | secureworld.io | David Balaban

    How Security Teams Collect the Data They Need for Threat Intelligence6:38 The evolution of cybercrime is shifting into hyperdrive. Malicious actors are file-tuning their tactics, techniques, and procedures (TTP) non-stop, leveraging AI to make attacks more sophisticated, and automation to overwhelm the target's defenses.

  • 2 weeks ago | cloudsecurityalliance.org | David Balaban

    Written by David Balaban. Staff records often contain sensitive content like personal identifiers and company-related communications. If this data is not properly cleared, it can result in compliance issues and unauthorized access. A systematic method guarantees that all digital and physical details are either erased, archived, or transferred in accordance with industry regulations. Furthermore, taking the route of automation throughout this process minimizes the risk of human error and misuse.

  • 3 weeks ago | unite.ai | David Balaban

    The introduction and evolution of generative AI have been so sudden and intense that it’s actually quite difficult to fully appreciate just how much this technology has changed our lives. Zoom out to just three years ago. Yes, AI was becoming more pervasive, at least in theory. More people knew some of the things it could do, although even with that there were massive misunderstandings about the capabilities of AI.

  • 1 month ago | unite.ai | David Balaban

    The privacy risks posed by generative AI are very real. From increased surveillance and exposure to more effective phishing and vishing campaigns than ever, generative AI erodes privacy en masse, indiscriminately, while providing bad actors, whether criminal, state-sponsored or government, with the tools they need to target individuals and groups.

  • 2 months ago | secureworld.io | David Balaban

    4 Most Common Network Attacks and How to Thwart Them8:42 Thinking of connectivity as the gravity center of every modern organization's digital ecosystem isn't a far-fetched perspective. It's deeply ingrained into the very fabric of collaboration, cloud computing, data sharing, remote work, and customer engagement. All these crucial areas take a major hit when a network attack happens. And, the unfortunate reality is that no network is immune.

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
11
Tweets
44
DMs Open
No
David Balaban
David Balaban @DavidBalaban1
17 Apr 21

Ways to Pinpoint Exploitable IoT Devices https://t.co/Vdc5Qj2SZH

David Balaban
David Balaban @DavidBalaban1
11 Feb 21

How Good Are In-Browser Password Managers? https://t.co/Om4W0eMHdG

David Balaban
David Balaban @DavidBalaban1
11 Feb 21

Ransomware evolution chronicles https://t.co/6YGfbaBMO9