What CISOs Can Do About Brand Impersonation Scam Sites
February 4 2023Apply these nine tips to proactively fight fraudulent websites that steal customers' trust, money, and personally identifiable information.
Read moreApply these nine tips to proactively fight fraudulent websites that steal customers' trust, money, and personally identifiable information.
Read moreA survey of giant squid science. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...
Read moreThe January attack was in retaliation for the satirical French magazine's decision to launch a cartoon contest to lampoon Iran's Supreme Leader.
Read moreA Hacker’s Mind will be published on Tuesday.
I have done a written interview and a podcast interview about the book. It’s been chosen as a...
Read moreIt's a bug fix for a bug fix. A memory leak was turned into a double-free that has now been turned into correct code...
Read moreThe greatly expanding attack surface created by the cloud needs to be protected.
Read moreInteresting research: “Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons“:
Abstract: In this paper we describe how to plant novel types of backdoors...
Read more
Engineers can use the Cyber Resiliency Engineering Framework Navigator to visuzalize their cyber resiliency capabilities.
Read moreDenver-based business secures Series A Funding through partnerships with Iron Gate Capital and Kozo Keikaku Engineering.
Read more
Recent Comments