4 min readJust now
β
Data Breaches, AI, and Security Studies to Welcome in 2026
Press enter or click to view image in full size
Army officer examining satellite surveillance footage on a big screen (DC Studio, FreePik)
As we get a bit more settled into 2026, new training sessions are getting scheduled and interesting guides are popping up everyday. Please be sure to check out the following articles, resources, and webinars and follow these creators for more information on OSINT investigations, cybersecurity, AI OPSEC, and much more.
Recommended Reading:
- From the Eurovision News Spotlight, this guide βoffers journalists a set of tools and a methodology for identifying who owns and runs hidden websites. In an era of digital obscurity, server fiβ¦
4 min readJust now
β
Data Breaches, AI, and Security Studies to Welcome in 2026
Press enter or click to view image in full size
Army officer examining satellite surveillance footage on a big screen (DC Studio, FreePik)
As we get a bit more settled into 2026, new training sessions are getting scheduled and interesting guides are popping up everyday. Please be sure to check out the following articles, resources, and webinars and follow these creators for more information on OSINT investigations, cybersecurity, AI OPSEC, and much more.
Recommended Reading:
-
From the Eurovision News Spotlight, this guide βoffers journalists a set of tools and a methodology for identifying who owns and runs hidden websites. In an era of digital obscurity, server fingerprinting is an important skill for verifying the reliability of sources and uncovering hidden networks of influence.β
-
Weβve all heard about the dangers of AI tracking our searches. INC has an insightful look at what our collective searches, logins, voice prints, and more provides AI training data sets and companies by way of understanding who we are, what we need, and how we make decisions. If youβre a business owner, this article provides steps to enhance your cybersecurity practices, and if youβre a routine AI user, it gives steps for keeping your data safe. A good primer to hand to someone who may still be in the dark with how to handle those omni-present AI βbest practices.β
-
If you routinely work attribution investigations, you know that there is rarely ever one piece of data that points to the answer or culprit. Enter OSINT and breach data. Security Boulevard examines how the combination of these data sets and collection can bolster attribution investigations for greater success.
-
Lastly, Security Week interviewed Shannon Miller, OSINT Investigator and Privacy Consultant, and discussed her background, experience, and the keeping families safe. Itβs always good to see how those in our community got their start and how they use their skills.
Selected Training:
- Skip Schiphorst and his colleague Eve Chow are back with a new FREE webinar on ππ¬π’π§π ππ ππ¨ ππ§π‘ππ§ππ ππ‘π’π§ππ¬π πππππ. Email Skip to register for the session, which will be held via Zoom. See below for more info or click here.
β Session 1: 19 Feb, 0900β1000 CET β Session 2: 20 Feb, 0900β1000 SGT
- From cloud security company Abnormal AI comes an upcoming session, βThreatStream: Cryptocurrency Fraud: Fast Money, Faster Scams.β The rise of crypto has created new opportunities β for both investors and attackers. In this session, weβll explore how threat actors exploit decentralised systems, impersonate crypto brands, and weaponise urgency to steal funds, and how Abnormal AI detects and blocks these fast-moving, irreversible scams.
β 2 Feb, 2000 EST click below to register
-
From the ICS2 Knowledge Vault, check out β**Security Industry 101: A βCrash Courseβ For Security Newbies,β **which was recorded in October 2024. New to the security industry? Or thinking about transitioning into an information security role? If so, this webinar is for you. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he provides a one-hour βcrash courseβ on the entire security industry, including:
-
Size and growth of the security industry
-
Useful vocabulary terms and buzz words
-
Five types of cyberthreat actors
-
Modern cyberthreats and tactics
-
Categories of security defenses
-
Common security job roles
-
Security industry ecosystem
-
Join Way2Protect in a webinar that discusses how, with the rise of AI, organizations risk blind spots that could undermine trust, governance, and resilience. βEvolving Security Culture: Aligning Human and AI Risks for Business Resilience,β uncovers practical strategies for managing security behaviors, bridging human and AI risks, and effectively communicating with executives and boards.
-
Considered β3 Hours to Master Forensic AI,β this FREE Generative AI Investigator Training by the Paraben Corporation provides instruction on how to secure, analyze, and verify. Learn more by clicking below and registering for the event on 28 January from 1000β1345 EST.