In contrast, Q1 2019 saw more interest in selling and buying access to individual servers. The first quarter of 2020 saw a dramatic rise in Dark Web offers to...
Read moreShadow IT, where workers sometimes go rogue in their efforts to solve business problems, can create challenges – and opportunities – for companies in the best of times. With...
Read moreDigital Transformation Risks in Front-end Code
May 21 2020Why making every front-end developer a DevSecOps expert will lead to a more holistic approach to web and native application security. One important, often overlooked, area for empowering developers...
Read moreScandal engulfed popular videoconferencing software Zoom when its promise of providing end-to-end encryption (E2EE), turned out to be a lie. For years the Zoom client informed users that “Zoom...
Read moreResearchers shows most “flight-risk” employees planning to leave an organization tend to start stealing data two to eight weeks before they go. More than 80% of employees planning to...
Read moreAs COVID-19-themed spam rises, phishing-not so much. An analysis of newly registered domains finds that only 2.4% are actually phishing sites aiming to steal credentials. While many security firms...
Read moreBart Gellman on Snowden
May 20 2020Bart Gellman's long-awaited (at least by me) book on Edward Snowden, Dark Mirror: Edward Snowden and the American Surveillance State, will finally be published in a couple of weeks....
Read moreThe Chrome browser will tell users if their browser is up to date, malicious extensions are installed, and/or a password has been compromised. Google has launched new security and...
Read moreCriminals and the Normalization of Masks
May 20 2020I was wondering about this: Masks that have made criminals stand apart long before bandanna-wearing robbers knocked over stagecoaches in the Old West and ski-masked bandits held up banks...
Read more
Recent Comments