Through this latest acquisition, the company adds two more California locations.
Read moreIncentives for good conduct and deterrents for bad behavior in cyberspace are impossible to effectively establish and enforce without international collaboration and commitment.
Read moreDrones Carrying Explosives
November 8 2021We’ve now had an (unsuccessful) assassination attempt by explosive-laden drones.
Read more3 Ways to Deal With the Trojan Source Attack
November 8 2021These scripts and commands can be used to block the Trojan Source attack.
Read moreAcceptto’s contextual behavior threat intelligence technology will help SecureAuth deliver AI-driven MFA and continuous password-less authentication, SecureAuth says.
Read moreFriday Squid Blogging: Squid Game Cryptocurrency Was a Scam
November 5 2021The Squid Game cryptocurrency was a complete scam:
The SQUID cryptocurrency peaked at a price of $2,861 before plummeting to $0 around 5:40 a.m. ET., according to the...
Read more
US Defense Contractor Discloses Data Breach
November 5 2021Electronic Warfare Associates says an attackers infiltrated EWA email in August, which led to the exfiltration of files with personal data.
Read moreWho’s Minding Your Company’s Crypto Decisions?
November 5 2021Security teams must first evaluate security protocols and the reputation of the cryptocurrency payment platform before their companies can proceed to accept the alternative currency as payment.
Read moreStop. Think. Connect. Don't let the crooks trick you into acting in haste.
Read moreGoogle and Salesforce executives discuss the need for the newly released MVSP, how tech companies came together to work on it, and how organizations should use it.
Read more
Recent Comments