Gartner predicts that by 2025 cyberattackers will have weaponized operational technology environments to successfully harm or kill humans. Ambulances rerouted. Gas supplies were disrupted, leading to days of...
In a panel at the ISC2 Security Congress 2021, Sharon Smith, CISSP, Lori Ross O’Neil, CISSP, Aanchal Gupta and Meg West, M.S., CISSP, discussed the challenges and...
ThycoticCentrify released new research confirming that ransomware has become a preferred method for cyberattacks, with nearly two out of three companies (64%) surveyed admitting to be...
(ISC)² published a new research study highlighting the unique challenges diverse cybersecurity professionals worldwide face and provides recommendations to create positive change. “In Their Own Words: Women...
The year is 2007, the iPhone 1 has just been released, and many of us are still bound to desktop computers on office desks. Over the...
Researchers find that lax ICS security is putting critical services at risk of exploitation. The “abysmal” state of security for industrial control systems (ICSs) is putting...
Researchers have disclosed the details of new timing and power-based side-channel attacks that affect all CPUs made by AMD, but the chipmaker says no new mitigations...
Fraud losses and customer experience are top-of-mind for financial institutions, according to the “2021 Fraud Transformation Survey: Detecting and Preventing Emerging Schemes” from BioCatch, a study...
Numerous reports like this one from TechJury underscore our increasing dependence on mobile apps for everything from tracking fitness and monitoring health to ordering food and booking flights....
It’s an ongoing battle; every year or two, there is a new policy proposal to authorize private-sector hack back and 2021 is no exception. The concept...