Where Are the Women? Making Cybersecurity More Inclusive
April 12 2023Stepped-up recruiting efforts along with better work-life balance policies and mentoring and recruitment programs will help balance the scales.
Read moreStepped-up recruiting efforts along with better work-life balance policies and mentoring and recruitment programs will help balance the scales.
Read moreIncident response experts share their secrets for success when it comes to creating a professional-grade ransomware response playbook. Are you ready for the worst?
Read moreStealing private keys is like getting hold of a medieval monarch's personal signet ring... you get to put an official seal on treasonous material.
Read moreThe campaign shrouds the commodity infostealer in OpenAI files in a play that aims to take advantage of the growing public interest in AI-based chatbots.
Read morePassword managers aren't foolproof, but they do help mitigate risks from weak credentials and password reuse. Following best practices can contribute to a company's defenses.
Read moreThe gap between permissions granted and permissions used exposes organizations to increased risk. (Part two of a two-part series.)
Read moreIsrael's National Cyber Defense is warning of increased cyberattacks by anti-Israel groups during the month of Ramadan.
Read moreIn three separate incidents, engineers at the Korean electronics giant reportedly shared sensitive corporate data with the AI-powered chatbot.
Read moreCar thieves are injecting malicious software into a car’s network through wires in the headlights (or taillights) that fool the car into believing that the electronic key is nearby. News...
Read moreMicrosoft and others are doubling down on incident response, adding services and integrating programs to make security analysts and IR engagements more efficient.
Read more
Recent Comments