Here's how to blunt the twinned forces of shadow IT and counterfeit apps and keep your data safe.
Read moreEnergy Market Manipulation with High-Wattage IoT Botnets
August 6 2020Attackers that can compromise enough products such as smart ACs and heaters can tweak power demand in subtle ways for financial gain or to hurt market players, researchers at...
Read moreRipple20: More Vulnerable Devices Identified
August 6 2020Security researchers find 34 additional vendors, and 47 devices, affected by the widespread Ripple20 vulnerabilities.
Read moreIt may sound look intimidating, but with a few tweaks to tools and processes already in use, it's not hard to get a head start on improving security posture...
Read moreA security engineer and infrastructure engineer with Salesforce share lessons learned from their professional role reversal, and advice for people on both teams.
Read moreThe CISO for Indiana University Health says simple policies, good communication, and strong authentication go much further than vendor tools in solving security problems.
Read moreSupporting Women in InfoSec
August 5 2020Maxine Holt, research director from Omdia, explains why the time is right for women to step into more cybersecurity jobs now.
Read moreDeveloping Community for Woman Infosec Pros in India
August 5 2020Vandana Verma tells us how women in India are finding support, education and love of cybersecurity through the growing InfosecGirls community.
Read moreWhat to Tell Young People of Color About InfoSec Careers
August 5 2020CEO and founder of Revolution Cyber Juliet Okafor and Baker Hughes Director of Global OT Security Programs Paul Brager talk about the unique lessons and hard truths they provide...
Read more
Recent Comments