TETRA:BURST - vulnerabilities in widely used radio standard could threaten military and law enforcement communications, as well as ICS.
Hi, what are you looking for?
TETRA:BURST - vulnerabilities in widely used radio standard could threaten military and law enforcement communications, as well as ICS.
100% key capture rate and successful ransomware decryption shows progress in ransomware defense capabilities.
While traditional security awareness teaches users how to recognize social engineering, new behavior changing trains the brain on the correct recognition and response to...
Security awareness training isn’t working to the level it needs to. Social engineering, however, is getting better. Why doesn’t awareness training work, and how...
Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...
QuickBlox SDK and API vulnerabilities impact chat and video applications used by industries including telemedicine, smart IoT, and finance.
Bugcrowd’s Inside the Mind of the Hacker report shows the speed and efficiency of hackers adopting new technologies to assist their hunting
SecurityWeek talks to Dennis Kallelis (CSO at Idemia) and Jason Kees (CISO at Ping), two of industry’s identity giants. The idea, as always, is...
Assuming NATO can play a greater part in the cybersecurity of its members, possibly through a more formal NATO Cyber Command, the question then...
SwSec 5D framework aims to provide a roadmap for secure software development, and its use would help improve security in the software supply chain.
Fears mount that UK Online Safety Bill may include a requirement for an encrypted message scanning capability.
Rapid7 analyzes the Japan threat landscape and warns that attacks against the third-largest economy in the world have global consequences.
Ann Dunkin, CIO at the Department of Energy, is more concerned about cyberattack speed than attack type or source.
Ask any three people to define cyberwar and you will get three different answers. But as global geopolitics worsen and aggressive cyberattacks increase, this...
A new bill proposes to increase cybersecurity funding for rural water systems by $7.5 million dollars per year.
Digitalization brings new security challenges, new concerns, and new threats, and CISOs should not think that it’s just business as usual.
SecurityWeek talks to Chief Information Security Officers from Bill.com, FreedomPay, and Tassat about their role and experience as CISOs.
Why are there so many vulnerabilities in Chrome? Is it realistically safe to use? Can Google do anything to make the web browser safer?
Nobody doubts the need to increase board level cyber expertise, but there is no single preferred route.
New SaaS-based secrets manager from Akeyless requires no new infrastructure, and no specialist staff nor secrets management team.