Cyber Security
INTERVIEW Aaron Portnoy confesses to periodic bouts of imposter syndrome, despite having carved out a distinguished career in offensive security. Among other things, Portnoy – now...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
INTERVIEW Aaron Portnoy confesses to periodic bouts of imposter syndrome, despite having carved out a distinguished career in offensive security. Among other things, Portnoy – now...
The single largest risk factor reported by respondents is the influx in remote work. Three in four public sector technology practitioners flag remote work...
In a joint advisory, international cybersecurity officials say failure to patch years-old vulnerabilities makes attributing cyberattacks more difficult. The top 30 vulnerabilities routinely exploited...
The initiative will not result in mandatory measures for the private sector, but the administration hopes to signal its commitment to cybersecurity and maybe...
With an estimated 12 million customers, Chime is the largest in its highly competitive subcategory of financial technology companies that serve low- to moderate-income...
FILE – In this Feb. 17, 2016, file photo an iPhone is seen in Washington. At a time of widespread digital insecurity it turns...
Experts say the doomed contract helped take cloud literacy at the Defense Department to the next level. It’s not every day that the government...
Bots filing bogus applications in bulk, teams of fraudsters in foreign countries making phony claims, online forums peddling how-to advice on identity theft: Inside...
The idea is that this would deter attacks because cybercriminals would know they couldn’t get paid. This story was originally posted by Stateline, an initiative...
No More Ransom has celebrated its fifth anniversary of helping victims to recover from ransomware attacks. The decryptors available in the No More Ransom repository have...
Recent Comments