North Korean state-sponsored actors, who help economically prop up Kim Jong Un's dictatorship, continue to pummel US infrastructure.
Read moreAverage Data Breach Costs Soar to $4.4M in 2022
July 27 2022Call it a 'cyber-tax': Those costs are usually passed on to consumers, not investors, as compromised businesses raise prices for goods and services.
Read moreDid you know that the standard router relied upon in homes and by thousands of small businesses is the most frequently attacked IoT device? James Willison, Project and Engagement...
Read moreNew careers in IT open up for former footballers.
Read moreIT admins can lock some of the obvious open doors in business applications, but system visibility is key. Build automatic monitoring defenses and adopt a Git-like tool so you...
Read more8 Hot Summer Fiction Reads for Cybersecurity Pros
July 27 2022A reading list of recommended novels curated by cybersecurity experts for cybersecurity experts.
Read moreSecuring Open-Source Software
July 27 2022Good essay arguing that open-source software is a critical national-security asset and needs to be treated as such:
Open source is at least as important to the economy, public...
Read more
A Retrospective on the 2015 Ashley Madison Breach
July 27 2022It's been seven years since the online cheating site AshleyMadison.com was hacked and highly sensitive data about its users posted online. The leak led to the public shaming and...
Read moreA Retrospective on the 2015 Ashley Madison Breach
July 27 2022It's been seven years since the online cheating site AshleyMadison.com was hacked and highly sensitive data about its users posted online. The leak led to the public shaming and...
Read more
Recent Comments