The ongoing cyber skills gap affects organizations worldwide and ultimately affects the entire digital economy. And cybersecurity changes and evolves at break-neck speed, which makes it...
Nextgov looks back at the Trump administration’s major IT policy moves that will have lasting effects on federal technology for the foreseeable future. Technology and tech...
It’s undeniable that Machine Learning (ML) is changing the game for securing cloud infrastructure. Security vendors have rapidly adopted ML as part of their solutions, and...
As if the exponential rise in phishing scams and malware attacks in the last five years wasn’t enough, the COVID-19 crisis has worsened it further. The...
Someone tried to use popular Google Chrome Extensions for secretly playing videos in users’ browsers to inflate view counts. Yesterday morning, our solutions started giving many...
LogRhythm Labs has gathered up the indicators of compromise (IOCs) from CISA, Volexity, and FireEye associated with the recent SolarWinds supply chain attack and made them...
Safe-Inet, a virtual private network (VPN) service favored by cybercriminals, has been taken down as part of a law enforcement action that police hope will lead onto follow-up...
INTERVIEW DuckDuckGo’s journey started as an idea in the mind of Gabriel Weinberg, who found poor search results and high levels of spam a daily annoyance...
A team of researchers today unveils two critical security vulnerabilities it discovered in Dell Wyse Thin clients that could have potentially allowed attackers to remotely execute...
Meet Issak Davidovich, Vice President of Research and Development at C2A Security. He has more than 16 years experience of leading embedded security teams. He joined...