What would happen if companies stopped paying ransoms? It took little over two hours for hackers to gain control of more than 100 gigabytes of information from Colonial...
ThycoticCentrify, a provider of cloud identity security solutions formed by the merger of privileged access management (PAM) leaders Thycotic and Centrify, announced new research that reveals more than...
Threat Intelligence has become a bucket for a lot of things – from Indicators of Compromise (IOC), to malware reverse engineering, to deep and dark web...
The most significant single obstacle to progress in cybersecurity is not the technical challenge or even the workforce/skills gap. In 2011, the Department of Homeland Security...
The Treasury Department runs a program to insure the insurers, but there’s a limit to the backstop. The Government Accountability Office plans to review how well-suited...
Five months before DarkSide attacked the Colonial pipeline, two researchers discovered a way to rescue its ransomware victims. Then an antivirus company’s announcement alerted the hackers....
PHP is one of the most popular programming languages used worldwide. It powers around 80% of the web, including popular content management systems like Drupal and...
The 70-page report assesses how neural networks and artificial intelligence could supercharge dis- and misinformation campaigns and sway the opinions of millions. A report released Wednesday...
Move over CISOs, it may be time to make room for chief product security officers. Recent attacks highlighting the foundational role of software in critical services—a...
The Homeland Security Committee cleared several bills to address cybersecurity following the attack on Colonial Pipeline. A bill to improve the cybersecurity of state, local, tribal...