DEF CON – “don’t worry, the elections are safe” edition
Don't worry, elections are safe. Our Security Researcher Cameron Camp provide us highlights from the DEF CON 30 conference.
Don't worry, elections are safe. Our Security Researcher Cameron Camp provide us highlights from the DEF CON 30 conference.
The digital skills gap, especially in cybersecurity, is not a new phenomenon. This problematic is now exacerbate by the prevalence of burnout, which was presented at Black Hat USA 2022
Windows used to be the big talking point when it came to exploits resulting in mass casualties. Nowadays, talks turned to other massive attack platforms like #cloud and cars
Tinder, Bumble or Grindr - popular dating apps depend heavily on your location, personal data, and loose privacy settings. Find out how to put yourself out there safely by following our suggested settings tweaks.
A deep-dive in Zero-trust, to help you navigate in a zero-trust world and further secure your organization.
Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer's pc, learn the steps to protect your new PC from cyberthreats.
Learn to spot some of the threats that you can face while browsing online, and the best tips to stay safe on the web.
The heavyweights are now moving into API security, cementing it as “A Thing”
It’s all fun and games until you get hacked – and this is just one risk of downloading cracked games
One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay?
Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders
API-based data transfer is so rapid, there’s but little time to stop very bad things happening quickly
Technology is understandably viewed as a nuisance to be managed in pursuit of the health organizations’ primary mission
Give employees the knowledge needed to spot the warning signs of a cyberattack and to understand when they may be putting sensitive data at risk
New and exacerbated cyber-risks following Russia’s invasion of Ukraine are fueling a new urgency towards enhancing resilience
The US military knows it needs to speed up technology adoption through optimization, something at the heart of Silicon Valley culture
An overview of some of the most popular open-source tools for threat intelligence and threat hunting
How well retailers can manage the surge in cyberthreats may be crucial for their prospects in a post‑pandemic world
No more turning a blind eye to algorithmic bias and discrimination if US lawmakers get their way
Some fraudsters may use low-tech tactics to steal your sensitive information – peering over your shoulder as you enter that data is one of them