Intergenerational Mentoring: Key to Cybersecurity’s AI Future – Dark Reading
As threats evolve and technology changes, our ability to work together across generations will determine our success. – Read More
As threats evolve and technology changes, our ability to work together across generations will determine our success. – Read More
New end-to-end Gmail encryption alone isn’t secure enough for an enterprise’s most sensitive and prized data, experts say. – Read More
Post Content – Read More
An old DNS switcheroo technique is still helping attackers keep their infrastructure alive. But is it really a pressing issue in 2025? – Read More
Hotel and casino operations for the Lower Sioux Indians have been canceled or postponed, and the local health center is redirecting those needing medical or dental care. – Read More
Shifting to a RaaS business model has accelerated the group’s growth, and targeting critical industries like healthcare, legal, and manufacturing hasn’t hurt either. – Read More
Layoffs may cause short-term disruptions, but they don’t represent a catastrophic loss of cybersecurity capability — because the true cyber operations never resided solely within CISA to begin with. –…
Signal, Wickr, WhatsApp, and Cape all have different approaches to security and privacy, yet most are finding ways to make secure communications more private. – Read More
At least three major energy solution and renewable energy companies have nearly 50 vulnerabilities — many of them “basic” mistakes — indicating a lack of developed cybersecurity safeguards. – Read…
The tech giant will enforce new email authentication protocols for Outlook users who send large volumes of email beginning on May 5. – Read More
The vendor had originally assessed the flaw as low risk but now says it is a critical issue that enables remote code execution. – Read More
CrushFTP CEO Ben Spink slammed several cybersecurity companies for creating confusion around a critical authentication bypass flaw that’s currently under attack. – Read More
The malware, first discovered in 2016, has been updated over the years, and the latest version is now hiding in the firmware of counterfeit mobile phones. – Read More
Co-founders Michael Sutton and David Endler raised $32 million to invest in early stage cybersecurity startups as well as to provide mentoring support. – Read More
Polices that forbid employees from divulging company details are worthless if the same information can be obtained from sources employees have no control over. – Read More