In cybersecurity, user error is the symptom, not the disease. A healthy culture acknowledges and addresses the underlying causes of lapses.
Read moreGoing Passwordless? Here Are 6 Steps to Get Started
April 11 2022High costs and user reluctance have stood in the way of passwordless adoption, but conversion can be simplified if you take it in more gradual steps.
Read moreDe-anonymizing Bitcoin
April 11 2022Andy Greenberg wrote a long article — an excerpt from his new book — on how law enforcement de-anonymized bitcoin transactions to take down a global child...
Read moreFriday Squid Blogging: Do Squid Have Emotions?
April 8 2022Scientists are now debating whether octopuses, squid, and crabs have emotions. Short answer: we don’t know, but can’t rule it out.
There may be a point when humans can...
Read more
SharkBot was hidden in apps masquerading as antivirus tools.
Read moreThe operation aimed to disrupt cyber espionage activity a Russian GRU group was using for the Ukraine war.
Read moreBakerHostetler Launches 2022 Data Security Incident Response Report — Resilience And Perseverance
April 8 2022Ransomware remained the most prevalent and impactful type of data security incident.
Read moreSoftware-as-a-Service Rules the Cloud
April 8 2022Half of the IT professionals surveyed who use cloud services also employ infrastructure-as-a-service and platform-as-a-service.
Read moreA rogue line-continuation character can trick the code into validating just the second half of the line, but executing all of it.
Read moreSecurity Pro File: The former Army captain, whose security startup is on an upward trajectory, works hard to "make compliance suck less."
Read more
Recent Comments