In Cyberwar, Attribution Can Be Impossible — and That’s OK
October 18 2021Instead of using a substantial proportion of resources to determine attribution, organizations should focus on defenses that will help them remediate an attack.
Read moreInstead of using a substantial proportion of resources to determine attribution, organizations should focus on defenses that will help them remediate an attack.
Read moreExplore. Experience. Share. How to get into cybersecurity...
Read moreThe Missouri governor wants to prosecute the reporter who discovered a security vulnerability in a state’s website, and then reported it to the state.
The newspaper agreed to hold...
Read more
The slate of Arsenal presentations at Black Hat Europe is set to feature lots of low-cost and free goodies for offensive security pros.
Read moreChina's premier hackers will target web browsers, operating systems, mobile devices, and even a car at Tianfu Cup.
Read moreMultifactor authentications soar as enterprises move away from passwords to secure hybrid workers.
Read moreNew video of a large squid in the Red Sea at about 2,800 feet. As usual, you can also use this squid post to talk about the security stories in...
Read moreInside their motivations, how they go about it -- and what businesses can do about it, according to Counterintelligence Institute founder Peter Warmka.
Read moreAre your network cables acting as undercover wireless transmitters? What can you do if they are?
Read moreDiscovered during a recent incident response engagement, the malware avoids Russian computers and uses a single symmetric key for encrypting every compromised system.
Read more
Recent Comments