We have recently seen a growing trend toward protectionism by nations struggling to adapt to a twenty-first century of unprecedented interconnectedness. The Trump Administration’s “America First”...
Dr. Chase Cunningham, a recipient of Security magazine’s Most Influential People in Security, has joined Ericom as its Chief Strategy Officer. In this role, he will shape the company’s strategic...
The software supply chain attack against IT infrastructure vendor SolarWinds last year has served to revive interest in technologies that might mitigate against this kind of...
QR codes have a variety of uses, from storing bank information for payments to ordering at restaurants or joining a WiFi network. But the easy-to-use codes...
The outgoing administration added items to federal agencies’ to-do lists, noting rising threats to the sector. The White House’s priorities for improving maritime cybersecurity include having...
The Cyber Unified Coordination Group believes fewer than ten government agencies were compromised in what is an ongoing intelligence operation. Federal agencies leading the response to...
In the wake of the recent hack, Microsoft President Brad Smith said contractual obligations hurt cross-government sharing following breaches. Just as reports of hackers accessing government...
A security researcher has earned a $30,000 bug bounty payout after seizing control of Facebook and Oculus accounts via exploitation of a trio of security vulnerabilities. Owners of...
Security updates have been released for Node.js to address multiple vulnerabilities, including a memory corruption bug and a flaw that opened the door to HTTP request...
A security vulnerability in Google Docs allowed malicious hackers to take screenshots of private documents, a security researcher has found. Reported by Sreeram KL under the Google...