The Defense Department must modernize user activity monitoring by prioritizing data that can be used early to proactively mitigate insider risk.
Read moreDecember’s Reimagining Democracy Workshop
August 23 2023Imagine that we’ve all—all of us, all of society—landed on some alien planet, and we have to form a government: clean slate. We don’t have any legacy systems from...
Read moreSpin.AI's risk assessment of some 300,000 browser extensions had overly permissive access and could execute potentially malicious behaviors.
Read moreThe vulnerability was being exploited in the wild, targeting two versions of Adobe ColdFusion.
Read moreControversial Cybercrime Law Passes in Jordan
August 23 2023The increase in cyberattacks against the Middle East in the last few years has pressured Jordan and other nations to better secure their infrastructures.
Read moreMalware aimed at macOS is no longer just a knockoff of a Windows bug, as a new infostealer proliferating on Mac laptops demonstrates.
Read moreSmart light bulbs could give away your password secrets
August 23 2023Cryptography isn't just about secrecy. You need to take care of authenticity (no imposters!) and integrity (no tampering!) as well.
Read more
Recent Comments