5 Signs Someone Might be Taking Advantage of Your Security Goodness
November 27 2020Not everyone in a security department is acting in good faith, and they'll do what they can to bypass those who do. Here's how to spot them.
Read moreNot everyone in a security department is acting in good faith, and they'll do what they can to bypass those who do. Here's how to spot them.
Read more
Last Thursday, Rudy Giuliani, a Trump campaign lawyer, alleged a widespread voting conspiracy involving Venezuela, Cuba, and China. Another lawyer, Sidney Powell, argued that Mr. Trump...
Read moreHow on earth are you supposed to figure out whether that home gadget you just ordered is full of security holes or not?
Read moreA security researcher explains the dangers of poor visibility in the cloud and a new strategy to evaluate IAM exposure in Google Cloud Platform.
Read moreDon't ignore cyber operations outside US and European interests, researcher says. We can learn a lot from methods used by attackers that aren't among the usual suspects.
Read moreThe "OODA loop" shows us how to secure cloud-native deployments and prevent breaches before they occur.
Read moreCybersecurity training needs an overhaul, though the training itself is only one small part of how security teams can influence user behavior.
Read moreHere's the latest Naked Security Podcast - listen now!
Read moreIn a lecture, Adam Shostack makes the case for a discipline of cyber public health. It would relate to cybersecurity in a similar way that public health relates to...
Read more
Recent Comments