Amid IT/OT convergence, organizations must adopt an "assume breach" mindset to stop bad actors and limit their impact.
Read moreWisconsin Governor Hacks the Veto Process
July 10 2023In my latest book, A Hacker’s Mind, I wrote about hacks as loophole exploiting. This is a great example: The Wisconsin governor used his line-item veto powers—supposedly...
Read moreEmployees now have the freedom to work wherever they want, which brings new challenges for security teams trying to protect data.
Read moreLog management tools help IT and security teams monitor and improve a system's performance by identifying bugs, cybersecurity breaches, and other issues that can create outages or compliance problems.
Read moreSecurity firms analyze attack paths and seek out weak identities to find compromise vectors and critical assets that need better controls.
Read moreGuardrails need to be set in place to ensure confidentiality of sensitive information, while still leveraging AI as a force multiplier for productivity.
Read moreGlobal Hacking Competition Addresses Critical Increase in Cybersecurity Threats for Businesses
July 8 2023Hack The Box launches Capture The Flag competition, including offensive and defensive challenges, to unite teams as cyberattacks increase in 2023 to unprecedented levels.
Read moreGDPR is halting Meta's new Threads app from entering EU markets, portending a broader struggle over the right ways to collect user data on social apps.
Read moreFriday Squid Blogging: Giant Squid Nebula
July 8 2023A mysterious squid-like cosmic cloud, this nebula is very faint, but also very large in planet Earth’s sky. In the image, composed with 30 hours of narrowband image...
Read more
US and Canadian government agencies find that new variants of the malware are increasingly being utilized.
Read more
Recent Comments