Despite some geopolitical overlaps with state attackers, the majority of cyberattacks still come from simple – or perhaps sophisticated – criminals who are more...
Hi, what are you looking for?
Despite some geopolitical overlaps with state attackers, the majority of cyberattacks still come from simple – or perhaps sophisticated – criminals who are more...
While cyber eyes are trained on Russia, we should remember that it is not the West’s only cyber adversary. China, Iran, and North Korea...
The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...
The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...
Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...
The question for 2023 and beyond is whether the cyberinsurance industry can make a profit without destroying its market.
SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...
The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.
The North Korean APT tracked as TA444 is either moonlighting from its previous primary purpose, expanding its attack repertoire, or is being impersonated by...
Many developers and security people admit to having experienced a breach effected through compromised API credentials.
Is the United States heading toward a recession? If we are, then profits will dip, and belts will be tightened while we wait for...
Congress is considering a US federal privacy law. It’s been brewing for the last ten years and is getting closer. On July 20, 2022,...