How the Cloud Is Shifting CISO Priorities
February 3 2023The greatly expanding attack surface created by the cloud needs to be protected.
Read moreThe greatly expanding attack surface created by the cloud needs to be protected.
Read moreInteresting research: “Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons“:
Abstract: In this paper we describe how to plant novel types of backdoors...
Read more
Engineers can use the Cyber Resiliency Engineering Framework Navigator to visuzalize their cyber resiliency capabilities.
Read moreDenver-based business secures Series A Funding through partnerships with Iron Gate Capital and Kozo Keikaku Engineering.
Read moreThe Russia-linked LockBit ransomware group claims to be behind the attack that fouled automated transactions for dozens of clients of financial technology firm ION Group.
Read moreExamining some key examples of recently found fraud sites that target the lucrative retail shoe industry helps us understand how brand impersonation sites evolve.
Read moreThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low risk, high reward, quick, easy, and low effort.
Read moreLatest episode - listen now!
Read moreAnalysts find that 98% of QNAP NAS are vulnerable to CVE-2022-27596, which allows unauthenticated, remote SQL code injection.
Read more
Recent Comments