A new workout leads to five smart lessons about the importance of converging security and fraud into a unified risk function.
Read morePipeline Operators Are Headed in the Right Direction, With or Without TSA’s Updated Security Directives
August 8 2022A worsening threat landscape, increased digitization, and the long-term positive effects of modern security strategies are pushing critical infrastructure operators to do better.
Read moreNIST’s Post-Quantum Cryptography Standards
August 8 2022Quantum computing is a completely new paradigm for computers. A quantum computer uses quantum properties such as superposition, which allows a qubit (a quantum bit) to be neither 0...
Read moreClass Action Targets Experian Over Account Security
August 6 2022A class action lawsuit has been filed against big-three consumer credit bureau Experian over reports that the company did little to prevent identity thieves from hijacking consumer accounts. The...
Read moreFriday Squid Blogging: New Squid Species
August 5 2022Seems like they are being discovered all the time: In the past, the DEEPEND crew has discovered three new species of Bathyteuthids, a type of squid that lives in depths...
Read moreWhat Worries Security Teams About the Cloud?
August 5 2022What issues are cybersecurity professionals concerned about in 2022? You tell us!
Read moreGenesis IAB Market Brings Polish to the Dark Web
August 5 2022As the market for initial access brokers matures, services like Genesis — which offers elite access to compromised systems and slick, professional services — are raising the bar in...
Read moreTraffic lights make a handy global metaphor for denoting the sensitivity of cybersecurity threat data - three colours that everyone knows.
Read moreFor the right price, threat actors can get just about anything they want to launch a ransomware attack — even without technical skills or any previous experience.
Read moreWith names, email addresses, and mobile numbers from underground databases, one person in five is at risk of account compromise even with SMS two-factor authentication in place.
Read more
Recent Comments