Digital supply chains are more vulnerable than ever; here's what you need to do to secure them.
Read moreThe Limits of Cyber Operations in Wartime
May 31 2022Interesting paper by Lennart Maschmeyer: “The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations“:
Abstract: Although cyber conflict has existed for thirty years, the strategic utility of cyber...
Read more
Security and Human Behavior (SHB) 2022
May 31 2022Today is the second day of the fifteenth Workshop on Security and Human Behavior, hosted by Ross Anderson and Alice Hutchings at the University of Cambridge. After two...
Read moreHome delivery scams are getting leaner, and meaner, and more likely to "look about right". Here's an example to show you what we mean...
Read more6 Steps to Ensure Cyber Resilience
May 30 2022To minimize the impact of cyber incidents, organizations must be pragmatic and develop a strategy of resilience for dealing with break-ins, advanced malware, and data theft.
Read moreThe most serious flaw gives attackers a way to remotely execute code on systems that many organizations use to move data in critical ICS environments, security vendor says.
Read moreFriday Squid Blogging: Squid Bites Diver
May 27 2022I agree; the diver deserved it. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...
Read moreOrganizations must ensure their kubelets and related APIs aren’t inadvertently exposed or lack proper access control, offering an easy access point for malicious actors.
Read moreSpace Force Expands Cyber Defense Operations
May 27 2022Space Force's Delta 6 cyber-defense group adds squadrons, updates legacy Satellite Control Network.
Read moreLatest episode - listen now!
Read more
Recent Comments