Zoom Announces Rollout of End-to-End Encryption
October 14 2020Phase 1 removes Zoom servers from the key generation and distribution processes.
Read morePhase 1 removes Zoom servers from the key generation and distribution processes.
Read moreLondon's Hackney Council says some services may be slow or unavailable as it researches a cyberattack affecting services and IT systems.
Read moreAs the pandemic continues, security teams still need help they can't get. But the "skills shortage" is only part of the story.
Read moreHere's how CISOs and IT security operations teams can best address key challenges to network monitoring that could increase malware dwell time.
Read more
This is a current list of where and when I am scheduled to speak:
The third-generation Xeon processors build in hardware security features to provide extra protection to data in transit, at rest, and in use.
Read moreThe National Institute of Standards and Technology's first post-quantum cryptography standard will address key issues, approaches, an arms race, and the technology's uncertain future.
Read moreMandiant Threat Intelligence recently promoted a threat cluster to a named FIN (or financially motivated) threat group for the first time since 2017. We have detailed FIN11's various...
Read moreMandiant Threat Intelligence recently promoted a threat cluster to a named FIN (or financially motivated) threat group for the first time since 2017. We have detailed FIN11's various...
Read moreMandiant Threat Intelligence recently promoted a threat cluster to a named FIN (or financially motivated) threat group for the first time since 2017. We have detailed FIN11's various...
Read more
Recent Comments