Electronic design automation solutions, software programs that help designers develop electronic systems and semiconductor chips, can be used in service of security assurance.
Read moreUsing Radar to Read Body Language
March 8 2022Yet another method of surveillance:
Radar can detect you moving closer to a computer and entering its personal space. This might mean the computer can then choose to perform...
Read more
8 More Women in Security You May Not Know But Should
March 8 2022Dark Reading highlights women who are quietly changing the game in cybersecurity. We also revisit some of those we've spoken to in the past to see what they're up...
Read moreBreaking the Bias for International Women’s Day 2022
March 8 2022The theme of International Women’s Day 2022 is “Break the bias." This is what #BreaktheBias means to me.
Read moreConti Ransomware Group Diaries, Part IV: Cryptocrime
March 8 2022Three stories here last week pored over several years’ worth of internal chat records stolen from the Conti ransomware group, the most profitable ransomware gang in operation today. The...
Read moreCrowdStrike, Cloudflare, and Ping Identity have teamed up with tools and services for the healthcare, power, and water industries as a way to quickly bolster their security on several...
Read moreGoogle in Talks to Acquire Mandiant
March 7 2022Last month, Microsoft was interested in buying Mandiant. Now, it's Google that is looking at a deal to boost Google Cloud.
Read moreName That Edge Toon: Animal Instincts
March 7 2022Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreOmniVPN™, a VPN technology that allows connections over any network access including CGNAT, multiple NATs, private IP addresses, cellular and satellite routers is now patented.
Read moreNew capabilities bring scale, simplicity, and 40% productivity gains to enterprise SSDLC programs
Read more
Recent Comments