After a decade of relative inactivity, self-described hactivist group Anonymous takes credit for a 269-gigabyte data dump of police department, fusion center, and...
"While SIA welcomes a constructive dialogue over the use of facial recognition technology, the Facial Recognition and Biometric Technology Moratorium Act...
Researchers from IntSights observed a sharp increase in the use of popular instant messaging apps over the past year among threat groups.Threat groups...
The right decoys can frustrate attackers and help detect threats more quickly.1 of 8The growing ability of attackers to breach even well-defended enterprise...
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal...
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal...
How epidemiology can solve the people problem in security.Like many others, I've alternated between a mild obsession with learning everything about COVID-19 and...
Cyber Risk Management maturity during digital transformation is associated with enhancing brand trust and reliability. Recovery from disruptions during COVID-19 pandemic has been...
Even as more code is produced, indirect dependencies continue to undermine security.Driven by growth in the JavaScript, Java, and Python ecosystems, the number...
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal...