Indicators point to Twitter's source code being publicly available for around 3 months, offering a developer security object lesson for businesses.
Read moreFrom rising stars to veterans heading up research teams, check out our profiles of women making a big impact in cyber defense as the threat landscape expands.
Read moreDrive to Pervasive Encryption Boosts Key Management
March 28 2023Key vaults, aka key management as a service (KMaaS), promise to allow companies to encrypt sensitive data across cloud and third parties with granular control.
Read moreMicrosoft says "successful exploitation requires uncommon user interaction", but it's the innocent and accidental leakage of private data you should be concerned about.
Read moreDon't assume stakeholders outside security understand your goals and priorities, but consider how you'll communicate with them to gain their support.
Read moreHacks at Pwn2Own Vancouver 2023
March 27 2023An impressive array of hacks were demonstrated at the first day of the Pwn2Own conference in Vancouver:
On the first day of Pwn2Own Vancouver 2023, security researchers successfully demoed...
Read more
His prediction was called a "Law", though it was an exhortation to engineering excellence as much it was an estimate.
Read moreCyberSecure Announces Strategic Alliance
March 25 2023The joint partnership represents expanded market opportunities.
Read moreThis is fascinating:
“When a squid ends up chipping what’s called its ring tooth, which is the nail underneath its tentacle, it needs to regrow that tooth very rapidly,...
Read more
In two days, ethical researchers from 10 countries have unearthed more than 22 zero-day bugs in a wide range of technologies at the annual hacking contest.
Read more
Recent Comments