Even as more attacks target humans, lack of dedicated staff, relevant skills, and time are making it harder to develop a security-aware and engaged workforce, SANS says.
Read moreThe latest evolution in social engineering could put fraudsters in a position to commit insider threats.
Read moreThe "Missing Cryptoqueen" makes the American Top Ten... but not in a good way.
Read moreThe hacktivist group is ramping up its activities and ready to assault governments and businesses with escalating capabilities.
Read moreAnalyzing the Swiss E-Voting System
July 1 2022Andrew Appel has a long analysis of the Swiss online voting system. It’s a really good analysis of both the system and the official analyses.
Read moreTransitive dependencies can complicate the process of developing software bills of materials.
Read moreTransitive dependencies can complicate the process of developing software bills of materials.
Read moreRSA 2022: Omdia Research Take Aways
July 1 2022The RSA conference in San Francisco always feels like drinking from a fire hose but especially this year at the first in-person RSA since the pandemic began.
Read moreWith more staff working remotely, identity, authentication, and access (IAA) has never been more important. Microsoft has a new response.
Read moreGoogle: Hack-for-Hire Groups Present a Potent Threat
June 30 2022Cyber mercenaries in countries like India, Russia, and the UAE are carrying out data theft and hacking missions for a wide range of clients across regions, a couple of...
Read more
Recent Comments