Banyan Security’s Jayanth Gummaraju makes the case for why zero trust is superior to VPN technology.
Read moreDeepSurface’s Tim Morgan explains how network complexity and cloud computing have contributed to the challenge, and how automation can help.
Read moreThe HEAT Is On, Says Menlo Security
August 20 2022Neko Papez, senior manager, cybersecurity strategy for Menlo Security, helps customers understand if they’re vulnerable to highly evasive adaptive threats (HEAT).
Read moreChris Cleveland, founder of PIXM, talks about phishers’ evasive maneuvers and how organizations can tap Computer Vision to keep email and its users safe.
Read moreThe countermeasure, which compares the time and voltage at which circuits are activated, is being implemented in 12th Gen Intel Core processors.
Read moreNIST Weighs in on AI Risk
August 20 2022NIST is developing the AI Risk Management Framework and a companion playbook to help organizations navigate algorithmic bias and risk.
Read morePatch Now: 2 Apple Zero-Days Exploited in Wild
August 19 2022The fact that the flaws enable remote code execution, exist across all major Apple OS technologies, and are being actively exploited heightens the need for a quick response.
Read moreThe jumbo flying squid (Dosidicus gigas) uses its color-changing ability as a language:
In 2020, however, marine biologists discovered that jumbo flying squid are surprisingly coordinated. Despite their large...
Read more
State-Sponsored APTs Dangle Job Opps to Lure In Spy Victims
August 19 2022APTs continue to exploit the dynamic job market and the persistent phenomenon of remote working, as explored by PwC at Black Hat USA.
Read moreVersion 2.0 of the ransomware group's operation borrows extortion tactics from the LockBit 3.0 group.
Read more
Recent Comments