<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cybersecurity on The Coders Blog</title><link>https://thecodersblog.com/categories/cybersecurity/</link><description>Recent content in Cybersecurity on The Coders Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 20 May 2026 08:35:44 +0000</lastBuildDate><atom:link href="https://thecodersblog.com/categories/cybersecurity/index.xml" rel="self" type="application/rss+xml"/><item><title>Unmasking VLM Vulnerabilities: A Blueprint for Interpretable Failure Analysis</title><link>https://thecodersblog.com/unmasking-vlm-vulnerabilities-a-blueprint-for-interpretable-failure-analysis/</link><pubDate>Thu, 14 May 2026 11:58:47 +0000</pubDate><guid>https://thecodersblog.com/unmasking-vlm-vulnerabilities-a-blueprint-for-interpretable-failure-analysis/</guid><description>&lt;h2 id="unmasking-vlm-vulnerabilities-a-blueprint-for-interpretable-failure-analysis"&gt;Unmasking VLM Vulnerabilities: A Blueprint for Interpretable Failure Analysis&lt;/h2&gt;
&lt;p&gt;Let&amp;rsquo;s cut to the chase. Vision-Language Models (VLMs) are impressive, sure, but when they go pear-shaped in safety-critical domains, it&amp;rsquo;s not good. The current obsession with just hitting accuracy metrics is a dead end. We need to actually understand &lt;em&gt;why&lt;/em&gt; they fail, not just &lt;em&gt;that&lt;/em&gt; they fail. This isn&amp;rsquo;t about finding edge cases; it&amp;rsquo;s about mapping out the entire vulnerability landscape so we can build something robust, not just performant.&lt;/p&gt;</description></item><item><title>7 Ways to Keep Your Data Secure on a Wireless Network</title><link>https://thecodersblog.com/7-ways-to-keep-your-data-secure-on-a-wireless-network/</link><pubDate>Thu, 15 Sep 2022 10:26:45 +0000</pubDate><guid>https://thecodersblog.com/7-ways-to-keep-your-data-secure-on-a-wireless-network/</guid><description>&lt;p&gt;Just as you will never leave the key to the front door of your house, or maybe leave a back door open for them to invade your home and steal your belongings, you also should not be providing a back door for cyber attackers to come and invade your Wi-Fi network, inject malware, and breach your data. Most households and businesses do the best security measures they can afford to keep unauthorised users away from their networks, but Wi-Fi access points and routers are like unguarded back doors if you are not careful.&lt;/p&gt;</description></item><item><title>How Remote Employees Can Keep Business Data Safe</title><link>https://thecodersblog.com/remote-work-and-security/</link><pubDate>Sat, 18 Dec 2021 00:00:00 +0000</pubDate><guid>https://thecodersblog.com/remote-work-and-security/</guid><description>&lt;p&gt;Even though countries are starting to open up their borders for the growth of the economy, there are still businesses that remain the same. Their operations do still require that their employees stay from home or work remotely.&lt;/p&gt;
&lt;p&gt;Remote employees or workers and freelancers have been around since the pandemic. It has increased tremendously due to the impact of the Covid-19 pandemic. In the US, freelancers have grown to almost two million from 2019 to 2020. That is an 8% increase.&lt;/p&gt;</description></item></channel></rss>