The vast majority (86.7%) of C-suite and other executives say they expect the number of cyberattacks targeting their organizations to increase over the next 12 months, according to a...
Read moreApple Patches Zero-Days in iOS 14.8 Update
September 13 2021An important security update addresses vulnerabilities in CoreGraphics and WebKit that may have been actively exploited.
Read moreConstructive Complaints: 5 Ways to Transform Problems Into Plans
September 13 2021Working in infosec has its challenges, and it's easy enough to complain about them. But that won't solve anything.
Read moreSerious Security: How to make sure you don’t miss bug reports!
September 13 2021Hey, let's create a text file that lists our security contacts! We'll call it... security DOT txt.
Read moreBooz Allen Hamilton Acquires Digital Forensics Firm Tracepoint
September 13 2021The company's technology will integrate with Booz Allen's commercial cyber business.
Read moreKiersten Todt Named Chief of Staff for CISA
September 13 2021Over the past four years, Todt has led CRI from conception to one of the leading global cybersecurity resources available to small and medium-sized enterprises (SMEs).
Read moreSuccessful collaboration requires a four-pronged approach that considers operations and infrastructure, leverages shared data, supports new workflows, and is formalized with documentation.
Read moreDesigning Contact-Tracing Apps
September 13 2021Susan Landau wrote an essay on the privacy, efficacy, and equity of contract-tracing smartphone apps. Also see her excellent book on the topic.
Read moreFriday Squid Blogging: Possible Evidence of Squid Paternal Care
September 10 2021Researchers have found possible evidence of paternal care among bigfin reef squid. As usual, you can also use this squid post to talk about the security stories in the news...
Read moreGroove Ransomware Gang Tries New Tactic to Attract Affiliates
September 10 2021The threat group, which leaked some 500,000 credentials for Fortinet SSL VPN devices, views ransomware as just one way to profit from compromised networks, experts say.
Read more
Recent Comments