The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) published the Resilient Positioning, Navigation, and Timing (PNT) Conformance Framework today. PNT services, such as...
The Institute for Security and Technology (IST) — in partnership with a broad coalition of experts in industry, government, law enforcement, nonprofits, cybersecurity insurance, and international...
CISA has updated AA20-352A: Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations, originally released December 17. This update states that CISA has...
Meet Issak Davidovich, Vice President of Research and Development at C2A Security. He has more than 16 years experience of leading embedded security teams. He joined...
In response to ongoing cybersecurity events, the National Security Agency (NSA) released a Cybersecurity Advisory “Detecting Abuse of Authentication Mechanisms.” The advisory provides guidance to National Security System...
There is an old saying that “There is strength in numbers.” But what happens when that strength is on the side of the intent to do harm? ...
If you were in an IT-related field 10 years ago, the term “Shadow IT” might strike fear into your heart. In case you missed it –...
A high impact vulnerability has been discovered in a popular Java cryptography library which could allow attackers to more easily brute force Bcrypt hashed passwords. CVE-2020-28052...
Nearly two-thirds of workers who have been working remotely during the pandemic would like to continue to do so. While working from home, the boundaries between work and...
The World Economic Forum today launched a new report that outlines how organizational leaders can influence their companies and encourage the responsible use of technology and...
Recent Comments