The CanSecWest security conference is going on this week in Vancouver. Part of the CanSecWest conference is the annual Pwn2Own contest where security researchers show off their hacking expertise and ...
Cpl. Howard Vosburg, of the Massachusetts Army National Guard, scans the crowd for possible threats at the 2011 Boston Marathon. (U.S. Army photo by Sgt. Jerry Saslav/Massachusetts National Guard ...
From the growing sophistication of zero-day exploits to the entrenchment of nation-state and cybercriminal alliances, 2024 delivered more evidence of how quickly the threat landscape continues to ...
Insights from an AWS crypto-mining campaign show how valid credentials, rapid resource abuse, and visibility gaps expose cloud security blind spots.
Jerome Kerviel, the Societe Generale trader that managed to lose more than $7 billion without the bank noticing, is facing charges of fraud and forgery. Security lessons of this debacle abound. As ...
I was recently looking over my collection of board games. As my eyes moved from game to game, I thought about the strategy and approach with which I play them. But, then, an entirely different set of ...
In the race to ship features, scale infrastructure and keep up in an increasingly competitive enterprise software market, it’s easy for technology companies—especially startups—to treat customer ...
An explosive new book Bad Blood: Secrets and Lies in a Silicon Valley Startup wasn’t written about security awareness, but it could have been. With the exception of a passing comment about digital ...
The adoption of nuclear power accelerated in reaction to oil crises in the past, and the proposition only makes greater sense ...