Latest epsiode. Listen now!
Read moreRestricting the Twitter API will have implications across Twitter, the broader Internet, and society, experts say. Is there a cybersecurity silver lining, or will threat actors pay to play?
Read moreHigh-quality tools and standards remain critical components in cybersecurity efforts even as budgets decline. It's important that staff knows response procedures and their roles, and also communicates well.
Read moreMary Queen of Scots Letters Decrypted
February 9 2023This is a neat piece of historical research.
The team of computer scientist George Lasry, pianist Norbert Biermann and astrophysicist Satoshi Tomokiyo—all keen cryptographers—initially thought the batch...
Read more
How Do Playbooks Help CISOs Improve SecOps?
February 9 2023Extended detection and response (XDR) solutions have evolved to offer automated tools, such as playbooks, that enhance context and response.
Read moreCISA Releases Recovery Script for Victims of ESXiArgs Ransomware
February 9 2023The malware has affected thousands of VMware ESXi hypervisors in the last few days.
Read moreJailbreak Trick Breaks ChatGPT Content Safeguards
February 9 2023Jailbreak command creates ChatGPT alter ego DAN, willing to create content outside of its own content restriction controls.
Read moreBuilding Up IAM in a Multicloud World
February 9 2023In the cloud-first world, the security goal is to ensure only qualified users can access information across clouds.
Read moreApps like Telegram, WhatsApp, and Discord are a hotbed of cybercriminal communication and scams.
Read more
Recent Comments