There is a standard playbook and best practice for when an organization discovers or is notified about a software vulnerability:...
This week’s news is action-packed, with police tricking ransomware into releasing keys to victims calling ransomware operations liars. The most interesting news this week is about...
Ann Cox, the lead at the Department of Homeland Security’s research office, emphasized community engagement and technological needs for a successful quantum-resilient future. The technological research...
The U.S. Cybersecurity and Infrastructure Security (CISA) agency has announced RedEye, an open-source analytic tool for operators to visualize and report command and control (C2) activity....
The deputy national security advisor for cyber and emerging tech said it should be up to sector-specific agencies to decide who should implement appropriate cybersecurity defenses....
A super-critical vulnerability in Adobe Magento could allow attackers to fully compromise e-commerce platforms, according to the security researcher who unearthed the bug. Adobe has urged...
Addressing a decades-old deficiency in coding curriculums could have a profound effect on the security of the software supply chain, a leading expert on the subject...
A new report from Booz Allen Hamilton analyzed more than a dozen Chinese-sponsored cyberattacks over the past decade. Chinese government-sponsored cyberattacks pose a challenge to U.S....
Uber’s security compromise earlier this month is an unfortunate result of concerns left over from an attack the company sustained in 2016 when a pair of...
Cisco published its 2022 Consumer Privacy Survey, an annual global review of consumers’ perceptions and behaviors on data privacy, highlighting the critical need for further transparency as...
Kylie Wright-Ford was recently named CEO of RSA Conference LLC. She joins RSAC with an extensive track record of building communities for business professionals, having served in...
Recent Comments