We commend vets in cyber, with this look at how the training and experience of former military personnel can be a big, differentiating asset in cybersecurity environments.
Read moreTwitter’s CISO Takes Off, Leaving Security an Open Question
November 11 2022Lea Kissner was one of three senior executives to quit this week, leaving many to wonder if the social media giant is ripe for a breach and FTC action.
Read moreLockBit Bigwig Arrested for Ransomware Crimes
November 11 2022A dual Russian-Canadian citizen is being extradited to the US to face charges related to LockBit ransomware activities.
Read moreLawsuit Seeks Food Benefits Stolen By Skimmers
November 11 2022A nonprofit organization is suing the state of Massachusetts on behalf of thousands of low-income families who were collectively robbed of more than a $1 million in food assistance...
Read moreS3 Ep108: You hid THREE BILLION dollars in a popcorn tin?
November 11 2022Patches, busts, leaks and why even low-likelihood exploits can be high-severity risks - listen now!
Read moreManaging and Mitigating Risk From Unknown Unknowns
November 11 2022Five practical steps to up-level attack surface management programs and gain greater visibility and risk mitigation around the extended ecosystem.
Read moreEvasive KmsdBot Cryptominer/DDoS Bot Targets Gaming, Enterprises
November 11 2022KmsdBot takes advantage of SSH connections with weak login credentials to mine currency and deplete network resources, as it gains a foothold on enterprise systems.
Read moreCloud storage databases, often deployed as "rogue servers" without the blessing of the IT department, continue to put companies and their sensitive data at risk.
Read moreAn Untrustworthy TLS Certificate in Browsers
November 10 2022The major browsers natively trust a whole bunch of certificate authorities, and some of them are really sketchy:
Google’s Chrome, Apple’s Safari, nonprofit Firefox and others allow the company,...
Read more
How to Close Kubernetes’ Network Security Gap
November 10 2022StackRox bridges network security and other gaps and makes applying and managing network isolation and access controls easier while extending Kubernetes' automation and scalability benefit.
Read more
Recent Comments