Sweatpants & Cyberthreats: Managing Remote Employee Risk
The remote work revolution did not just change where we work, it redefined how we secure our workplaces. The shift, […]
Sweatpants & Cyberthreats: Managing Remote Employee Risk Read Post »
The remote work revolution did not just change where we work, it redefined how we secure our workplaces. The shift, […]
Sweatpants & Cyberthreats: Managing Remote Employee Risk Read Post »
A newly identified cybercrime group TA585 is running an advanced cyber operation distributing MonsterV2 malware Read More
Hacker Group TA585 Emerges With Advanced Attack Infrastructure Read Post »
Criminals have been spotted exploiting a new zero-day vulnerability in Gladinet CentreStack and Triofox file sharing servers that could allow
Gladinet file sharing zero-day brings patched flaw back from the dead Read Post »
My latest book, Rewiring Democracy: How AI Will Transform Our Politics, Government, and Citizenship, will be published in just over
Rewiring Democracy is Coming Soon Read Post »
A rise in attacks exploiting RMM tools like ScreenConnect enables system control via phishing tactics Read More
Hackers Target ScreenConnect Features For Network Intrusions Read Post »
How Artificial Intelligence is transforming both cyber defense and cybercrime by Venkatesh Apsingekar, Senior Engineering Manager – Illumio I recently
At their core, alerts exist to bring attention to something meaningful: an indicator of compromise (IOC), an indicator of attack
Your Alerts Are Increasing Your Cybersecurity Risk Read Post »
The Department of Defense recently sent defense contractors a clear signal: an update to the recently finalized CMMC 2.0 is
Is CMMC 3.0 on the Horizon? How Defense Contractors Can Prepare Now Read Post »
The word “bot” doesn’t have the best reputation right now. You hear it and think of election manipulation, fake social
In Defense of Good Bots: Good Bots Exist, But Only When We Build Them That Way Read Post »
In today’s cybersecurity landscape, identity is no longer just a credentialing concern; it is the battleground. Modern cyber defenses increasingly