Latest episode - listen now!
Read moreCISOs and their staffs are up against too many systems, screens, and alerts, with too few solutions to effectively address pain points.
Read moreA new patched memory corruption vulnerability in Apple's AWDL protocol can be used to take over iOS devices that are in close proximity to an attacker.
Read moreOpen Source Flaws Take Years to Find But Are Quick to Fix
December 2 2020Companies need to embrace automation and dependency tracking to keep software secure, GitHub says in its annual security report.
Read moreCybersecurity in the Biden Administration: Experts Weigh In
December 2 2020Security pros and former government employees share their expectations and concerns for the new administration - and their hope for a "return to normal."
Read moreResearchers Discover New Obfuscation-As-a-Service Platform
December 2 2020Researchers detail how a Android APK obfuscation service automates detection evasion for highly malicious apps.
Read moreFBI: BEC Scammers Could Abuse Email Auto-Forwarding
December 2 2020Private Industry Notification warns of the role email auto-forwarding could be used in business email compromise attacks.
Read moreLoyal Employee … or Cybercriminal Accomplice?
December 2 2020Can the bad guys' insider recruitment methods be reverse-engineered to reveal potential insider threats? Let's take a look.
Read moreImpressive iPhone Exploit
December 2 2020
This is a scarily impressive vulnerability:
Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a memory corruption bug in the iOS kernel that gave...
Read more
Automated Pen Testing: Can It Replace Humans?
December 2 2020These tools have come a long way, but are they far enough along to make human pen testers obsolete?
Read more
Recent Comments