Three different companies from three separate continents have agreed a memorandum of understanding to advance secure communications...
Kevin Townsend
Maarten Van Horenbeeck was inspired by a movie – he watched WarGames as a child. He became...
We knew it was coming and now it is here: AI-powered spear phishing now outperforms elite human-generated...
Washington, DC-based Corsha provides a machine identity platform (m-IdP) that authenticates, manages, and governs the growing traffic...
The PCI DSS concentrates its regulations on ‘what’ rather than ‘how’ but remains one of the best...
Strong defense comes from attacking the enemy’s weak points. Google DeepMind has developed an evaluation framework that...
The scope, scale, and evolving tactics of North Korean IT workers infiltrating western organizations continues to grow....
Healthcare is consistently one of the most attacked critical industries – it is a prime ransomware target....
Analysis of threats detected in the latter half of 2024, demonstrates that attackers evolve rather than abandon...
The history of Frank Trezza is not unusual among hackers – from a young prankster through growing...