Secure Development Takes a (Remote) Village
August 13 2020The shift to work from home isn't just about giving your Dev team the physical tools they need.
Read moreThe shift to work from home isn't just about giving your Dev team the physical tools they need.
Read moreAPT 28, aka Fancy Bear, is deploying the Drovorub malware designed for Linux systems as part of cyber-espionage operations.
Read moreHow to stay safe when you're using Tor, even if the network is littered with rogues.
Read moreInfosec practitioners face a variety of mental struggles in areas such as awareness training, problem solving, or general mental health. Several sessions at Black Hat USA 2020 highlighted these...
Read moreInteresting paper on recent hack-and-leak operations attributed to the UAE: Abstract: Four hack-and-leak operations in U.S. politics between 2016 and 2019, publicly attributed to the United Arab Emirates (UAE),...
Read moreThe debut of Forcepoint's two-pronged zero trust access (ZTA) solution delivers much-needed competitive momentum, but it must do more to stand out against a growing field of ZTA competitors.
Read moreSome titles are hot, while others are not, amid rapidly shifting business priorities.
Read moreNew iOS privacy features require developers to disclose what data they're collecting, how they're using it, and with whom they share it.
Read moreIsraeli startup joins growing number of vendors offering platform for detecting and mitigating common configuration errors in cloud environments.
Read moreSecurity researchers tracking Emotet report its reemergence brings new tricks, including new evasion techniques to bypass security tools.
Read more
Recent Comments