CISA, FBI, and NSA issue advisory and defense practices to help these utilities thwart "ongoing" threats targeting IT and OT networks.
Read morePraetorian Launches Snowcat Tool for Istio
October 14 2021Snowcat is the world's first static analysis tool dedicated to Istio.
Read moreDigging Deep Into the Top Security Certifications
October 14 2021When it comes to technical certifications, which ones pay off so you can get that infosec job or more money for the one you're already doing?
Read moreMissouri Governor Vows to Prosecute St. Louis Post-Dispatch for Reporting Security Vulnerability
October 14 2021On Wednesday, the St. Louis Post-Dispatch ran a story about how its staff discovered and reported a security vulnerability in a Missouri state education website that exposed the Social...
Read moreOpen Source Security Foundation Raises $10M
October 14 2021Industry leaders from technology, financial services, telecom, and cybersecurity sectors respond to Biden's executive order and commit to a more secure future for software.
Read moreThe Human Element Is the Weakest Link
October 14 2021While the recent Facebook outage was a major inconvenience, the impact of leaked business operations documents is a much bigger issue than being down for a few hours.
Read moreUpcoming Speaking Engagements
October 14 2021This is a current list of where and when I am scheduled to speak: I’ll be speaking at an Informa event on November 29, 2021. Details to come. The list is...
Read moreRecovering Real Faces from Face-Generation ML System
October 14 2021New paper: “This Person (Probably) Exists. Identity Membership Attacks Against GAN Generated Faces.
Abstract: Recently, generative adversarial networks (GANs) have achieved stunning realism, fooling even human observers. Indeed, the...
Read more
How Security Teams Can Reinforce End-User Awareness
October 14 2021Training programs provide the information, but security teams can reinforce these for better end-user education.
Read moreFallout from the transition highlights the need for organizations to monitor and have processes for updating CA roots, experts say.
Read more
Recent Comments