In this Help Net Security interview, Jonathan Segev, IEEE 802.11 Task Group (TG) Chair of next-generation positioning (TGaz) at IEEE, discusses IEEE 802.11az. The new standard will...
As security vulnerabilities are reported to you time and again, you may ask yourself: “Why don’t these developers learn the lesson?” The next thing you may think is:...
It has recently come to light that the individuals responsible for the development and distribution of the infamous Raccoon Stealer malware have returned to online hacker...
We’re down to the final weeks of registration for mWISE, the highly targeted, community-focused cybersecurity conference from Mandiant, now part of Google Cloud. It takes place...
When a cyberattack like the 2023 MOVEit hack makes global news headlines, attention often focuses on the names of the affected organizations, or the number of people impacted....
Tesla designs and manufactures several EV products, but what sets it apart from others is its cars, which are feature loaded. Among its exceptional characteristics, Tesla...
A Chief Information Security Officer (CISO) plays a crucial role in protecting an organization’s digital assets. They are responsible for ensuring the security of sensitive information,...
To counteract new and emerging threat methods enhanced by artificial intelligence, specialized email security vendors are leveraging a synergy of AI and human insights to enhance...
In this Help Net Security interview, David Gugelmann, CEO at Exeon, sheds light on the current cyber threats and their challenges for network security. He discusses the...
There is a standard playbook and best practice for when an organization discovers or is notified about a software vulnerability: The organization works quickly to fix...
Recent Comments