More Than Ever, Security Matters
April 1 2022Public policy proposals must consider technical, practical, and real-world security effects, and make sure we avoid unintended consequences.
Read morePublic policy proposals must consider technical, practical, and real-world security effects, and make sure we avoid unintended consequences.
Read moreCISA urges organizations using affected technologies to implement recommended mitigation measures.
Read moreThe exploit requires a specific nonstandard configuration to work, limiting the danger it poses, but future research could turn up more broadly usable attacks.
Read moreRansomware is a major threat, and no business is "too small to target." So what should you do after an attack? Is negotiating with criminals ever the answer?
Read moreThe cybersecurity market is red-hot. But with so many still-unfilled positions, companies may be more willing to bend or break some hiring rules.
Read moreFBI and international law enforcement agencies execute "Operation Eagle Sweep."
Read moreThe Academic Engagement Network is designed to advance cybersecurity in four areas.
Read moreTake a preventative threat approach and apply security measures near end users, applications, and data to increase protection.
Read moreAmong them is the operator of the Ghostwriter misinformation campaign, with a new browser-in-browser phishing technique, according to Google's research team.
Read more
Recent Comments