With its benefits of deniability, relatively low costs, and the ability to attack from anywhere, cyber terrorism will increasingly threaten civilians everywhere.
Read moreAmy Zegart on Spycraft in the Internet Age
February 8 2022Amy Zegart has a new book: Spies, Lies, and Algorithms: The History and Future of American Intelligence. Wired has an excerpt:
In short, data volume and accessibility are...
Read more
It's been a long time coming, and we're not there yet, but at least Microsoft Office will be a bit safer against macro malware...
Read moreQualys Launches Context XDR
February 8 2022Qualys Context XDR provides the security context that operations teams need to eliminate false positives and noise by triangulating risk posture, asset criticality, and threat intelligence.
Read moreInterVision Unveils Ransomware Protection as a Service
February 8 2022InterVision RPaaS solution provides protection, response, and recovery in one managed service.
Read moreDeepSurface Security Secures $4.5M for Business Expansion
February 8 2022Funding round was led by Differential Ventures, an artificial intelligence and cybersecurity seed venture fund.
Read moreSalesforce DevOps Needs Guardrails
February 8 2022Some companies go too fast when it comes to SaaS, DevOps, and security, but smart developers and implementers will respect some basic guidelines to keep their product safe.
Read morePrioritizing the Right Vulnerabilities to Reduce Risk
February 8 2022Prioritization needs to be part of vulnerability management if security teams are to keep up and mitigate issues in a timely manner.
Read morePrioritizing the Right Vulnerabilities to Reduce Risk
February 8 2022Prioritization needs to be part of vulnerability management if security teams are to keep up and mitigate issues in a timely manner.
Read moreRussian APT Steps Up Malicious Cyber Activity in Ukraine
February 7 2022Actinium/Gameredon's attacks are another reminder of why organizations need to pay additional scrutiny to systems in the region.
Read more
Recent Comments