DEF CON 30: Hackers Come Home to Vibrant Community
August 15 2022After 30 years and a brief pandemic hiatus, DEF CON returns with "Hacker Homecoming," an event that put the humans behind cybersecurity first.
Read moreAfter 30 years and a brief pandemic hiatus, DEF CON returns with "Hacker Homecoming," an event that put the humans behind cybersecurity first.
Read moreThe most heavily targeted flaw last quarter was a remote code execution vulnerability in Microsoft Office that was disclosed and patched four years ago.
Read moreZTNA brings only marginal benefits unless you ensure that the third parties you authorize are not already compromised.
Read moreThere's many a slip 'twixt the cup and the lip. Or at least between the TOC and the TOU...
Read moreThere's many a slip 'twixt the cup and the lip. Or at least between the TOC and the TOU...
Read moreScammers were able to convince YouTube that other peoples’ music was their own. They successfully stole $23 million before they were caught.
No one knows how common this scam...
Read moreHere's how to flip the tide and tap open source intelligence to protect your users.
Read moreThis is a current list of where and when I am scheduled to speak: I’m speaking as part of a Geneva Centre for Security Policy course on Cyber Security in...
Read moreAttacked once, victimized multiple times: Data marketplaces are making it easier for threat actors to find and use data exfiltrated during ransomware attacks in follow-up attacks.
Read moreI think the U is forced: SQUID consists of five steps: Stop, Question, Understand, Imagine, and Decide. As usual, you can also use this squid post to talk about the security...
Read more
Recent Comments