Recovering Passwords by Measuring Residual Heat
Researchers have used thermal cameras and ML guessing techniques to recover passwords from measuring the residual heat left by fingers on keyboards. From the abstract:...
Information overload, burnout, talent retention impacting SOC performance
While most security teams believe that security operations centers (SOCs) play a pivotal role in cybersecurity programs, several challenges are impacting SOC performance within businesses,...
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser...
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution.
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe ColdFusion is a web-application development...
12 Essential ways to improve your website security
This blog was written by an independent guest blogger. In today's digital age, a business website is essential for success. Not only does it provide...
EU-US data sharing agreement: Is it a done deal?
With both Privacy Shield and Safe Harbor having been previously struck down by legal challenges, experts question whether US President Biden’s executive order implementing the...
Claroty Found Hardcoded Cryptographic Keys in Siemens PLCs Using RCE
The vulnerability has been assigned a CVE – Siemens has already updated affected systems and published recommendations for mitigating the risk Read More
Why CISO roles require business and technology savvy
Of all the crazy postings that advertise for CISO jobs, the one asking for a CISO to code in Python was probably the most outrageous...
China’s attack motivations, tactics, and how CISOs can mitigate threats
A new report published by Booz Allen Hamilton provides detailed insight into global cyber threats posed by the People’s Republic of China (PRC). The China...
Top considerations when choosing a multi-factor authentication solution
Passwords clearly are not enough to protect networks. Any security guidance will tell you that multi-factor authentication (MFA) is a key method to keep attackers...