Take historically biased data, then add AI and ML to compound and exacerbate the problem.
Read moreMoving from DevOps to CloudOps: The Four-Box Problem
March 26 2021With SOC teams running services on multiple cloud platforms, their big concern is how to roll up configuration of 200+ servers in a comprehensive way.
Read moreHacking Weapons Systems
March 26 2021Lukasz Olejnik has a good essay on hacking weapons systems. Basically, there is no reason to believe that software in weapons systems is any more vulnerability free than any other...
Read moreAlan Turing’s £50 banknote officially unveiled
March 26 2021If only he'd been treated like this in his lifetime: the computing pioneer who knew "this is only a foretaste".
Read moreExec Order Could Force Software Vendors to Disclose Breaches to Federal Gov’t Customers
March 25 2021A decision on the order, which contains several recommendations, is still forthcoming.
Read moreCISA Adds Two Web Shells to Exchange Server Guidance
March 25 2021Officials update mitigation steps to include two new Malware Analysis Reports identifying Web shells seen in Exchange Server attacks.
Read moreIn Secure Silicon We Trust
March 25 2021Building upon a hardware root of trust is becoming a more achievable goal for the masses and the roots are digging deeper. Here's what you need to know.
Read moreInformation leakage and applications asking for too many permissions were also major issues, according to a survey of more than 3,300 popular mobile applications.
Read moreSecurity Operations in the World We Live in Now
March 25 2021Despite the challenges of remote work, security operations teams can position themselves well for the future.
Read moreCIOs must create a culture centered around cybersecurity that is easily visible and manageable.
Read more
Recent Comments