Supporting Africa’s Cybersecurity Talent Makes the World Safer
September 18 2023The global infosec community needs to help African nations defend against growing threats.
Read moreThe global infosec community needs to help African nations defend against growing threats.
Read moreRemember last November, when hackers broke into the network for LastPass—a password database—and stole password vaults with both encrypted and plaintext data for over 25 million users?
Well, they’re...
Read moreBefore working with new vendors, it's important to understand the potential risks they may pose to your digital environments.
Read moreJust like with using open source, organizations need to be diligent about testing AI components and understanding where and how it is used in their software.
Read moreCISOs can refine their soft skills to help get their cybersecurity best-practices message across. Steps include increasing staff incident-response training and staying current with the threat landscape.
Read moreEscalating incursions into military base infrastructure, telecom networks, utilities, and more signal that Beijing is laying the groundwork for mass disruption.
Read moreThe maintainers of the widely used library recently patched multiple memory corruption vulnerabilities that attackers could have abused to, ahem, curse targets with malicious code and escalate privileges.
Read moreTwo links on how to properly clean squid. I learned a few years ago, in Spain, and got pretty good at it. As usual, you can also use this squid post...
Read moreClaude (Anthropic’s LLM) was given this prompt: Please summarize the themes and arguments of Bruce Schneier’s book Beyond Fear. I’m particularly interested in a taxonomy of his ethical arguments—please...
Read more
Recent Comments