The well-known collective is taking on targeted advertising with the Veilid framework and says it wants to make the Internet accessible to everyone who fears being monetized.
Read moreThe attack surface of a live event like this summer’s World Cup in Australia and New Zealand rivals that of a large multinational enterprise, or even a small city.
Read moreRare government, industry alignment on AI threats means we have an opportunity to make rapid strides to improve cybersecurity and slip the hold cybercriminals have on us.
Read moreExclusive: CISA Sounds the Alarm on UEFI Security
August 4 2023Had Microsoft had adopted a more secure update path to mitigate the BlackLotus UEFI bootkit, it might already be eliminated, a CISA official says.
Read moreThe Nobelium APT is launching highly targeted Teams-based phishing attacks on government and industrial targets using compromised Microsoft 365 tenants, with the aim of data theft and cyber espionage.
Read moreThe Nobelium APT is launching highly targeted Teams-based phishing attacks on government and industrial targets using compromised Microsoft 365 tenants, with the aim of data theft and cyber espionage.
Read moreIndustrial devices are less likely to be patched due to expensive downtime, and threat actors have taken notice.
Read moreHow to Create an Effective GRC Program: 3 Phases
August 3 2023A crawl, walk, run approach allows organizations to establish a governance, risk, and compliance (GRC) program that grows and matures with the business.
Read moreCISOs Need Backing to Take Charge of Security
August 3 2023Unless the CEO and other C-suite executives defer to the CISO's decisions on cybersecurity, is that CISO really running things?
Read more
Recent Comments