Building Cybersecurity Strategies in Sub-Saharan Africa
August 5 2020Evelyn Kilel and Laura Tich of Shehacks Ke discuss how they are working to build cybersecurity strategies that suit the needs and capabilities of developing nations.
Read moreEvelyn Kilel and Laura Tich of Shehacks Ke discuss how they are working to build cybersecurity strategies that suit the needs and capabilities of developing nations.
Read moreNeoEYED CTO Tamaghna Basu tells us how he created an AI bot to mimic him, how it could be used in social engineering attacks, and what the experience taught...
Read moreMaintaining myriad open source components can be tough. Here's how teams can begin to address open source security and continue to innovate.
Read moreThe new Cyber Career Pathways Tool helps individuals understand the roles in cybersecurity and how to prepare for them.
Read moreAttackers could work around an earlier patch and use Microsoft Teams Updater to download binaries and payloads.
Read moreBudgets rise as IT complexity continued to challenge companies, with identity and access management technology an increasingly common focus.
Read moreThe 2019-2020 program year awarded 327 security researchers through 15 bounty programs, with a largest reward of $200,000.
Read moreConfidential Computing is a transformational technology that should be part of every enterprise cloud deployment. It's time to start unlocking the possibilities together.
Read moreMost attacks were small, but the big ones got bigger than ever, Cloudflare says.
Read more
Recent Comments