Rare government, industry alignment on AI threats means we have an opportunity to make rapid strides to improve cybersecurity and slip the hold cybercriminals have on us.
Read moreExclusive: CISA Sounds the Alarm on UEFI Security
August 4 2023Had Microsoft had adopted a more secure update path to mitigate the BlackLotus UEFI bootkit, it might already be eliminated, a CISA official says.
Read moreThe Nobelium APT is launching highly targeted Teams-based phishing attacks on government and industrial targets using compromised Microsoft 365 tenants, with the aim of data theft and cyber espionage.
Read moreThe Nobelium APT is launching highly targeted Teams-based phishing attacks on government and industrial targets using compromised Microsoft 365 tenants, with the aim of data theft and cyber espionage.
Read moreIndustrial devices are less likely to be patched due to expensive downtime, and threat actors have taken notice.
Read moreHow to Create an Effective GRC Program: 3 Phases
August 3 2023A crawl, walk, run approach allows organizations to establish a governance, risk, and compliance (GRC) program that grows and matures with the business.
Read moreHow Malicious Android Apps Slip Into Disguise
August 3 2023Researchers say mobile malware purveyors have been abusing a bug in the Google Android platform that lets them sneak malicious code into benign mobile apps and evade security scanning...
Read moreThe Need for Trustworthy AI
August 3 2023If you ask Alexa, Amazon’s voice assistant AI system, whether Amazon is a monopoly, it responds by saying it doesn’t know. It doesn’t take much to make it...
Read moreCISOs Need Backing to Take Charge of Security
August 3 2023Unless the CEO and other C-suite executives defer to the CISO's decisions on cybersecurity, is that CISO really running things?
Read moreIt's a real vulnerability, but the data leakage rate can be as low as... let's just say that an IMAX-quality copy of the new "Oppenheimer" movie could take you...
Read more
Recent Comments