Here's how to blunt the twinned forces of shadow IT and counterfeit apps and keep your data safe.
Read moreEnergy Market Manipulation with High-Wattage IoT Botnets
August 6 2020Attackers that can compromise enough products such as smart ACs and heaters can tweak power demand in subtle ways for financial gain or to hurt market players, researchers at...
Read moreThe NSA on the Risks of Exposing Location Data
August 6 2020The NSA has issued an advisory on the risks of location data. Mitigations reduce, but do not eliminate, location tracking risks in mobile devices. Most users rely on features...
Read moreRipple20: More Vulnerable Devices Identified
August 6 2020Security researchers find 34 additional vendors, and 47 devices, affected by the widespread Ripple20 vulnerabilities.
Read moreIt may sound look intimidating, but with a few tweaks to tools and processes already in use, it's not hard to get a head start on improving security posture...
Read moreAn alleged hacker's bail hearing held online via Zoom with screen sharing enabled... what could possibly go wrong?
Read moreA security engineer and infrastructure engineer with Salesforce share lessons learned from their professional role reversal, and advice for people on both teams.
Read moreThe CISO for Indiana University Health says simple policies, good communication, and strong authentication go much further than vendor tools in solving security problems.
Read moreSupporting Women in InfoSec
August 5 2020Maxine Holt, research director from Omdia, explains why the time is right for women to step into more cybersecurity jobs now.
Read moreDeveloping Community for Woman Infosec Pros in India
August 5 2020Vandana Verma tells us how women in India are finding support, education and love of cybersecurity through the growing InfosecGirls community.
Read more
Recent Comments