3 authentication-level protections for remote users and devices
Do the traditional techniques of protection still work in the age of work from home? Yes, but you need to use different rules and products....
School-Aged Students Urged to Consider New Cyber Qualification
CIISec’s Extended Project Qualification is open to anyone over 14 Read More
Microsoft Patch Tuesday, February 2022 Edition
Microsoft today released software updates to plug security holes in its Windows operating systems and related software. This month’s relatively light patch batch is refreshingly...
Microsoft’s February 2022 Patch Tuesday Addresses 48 CVEs (CVE-2022-21989)
Microsoft addresses 48 CVEs in its February 2022 Patch Tuesday release, including one zero-day vulnerability that was publicly disclosed, but not exploited in the wild....
Top Pentagon Cybersecurity Official Resigns
Katie Arrington steps down in protest over movement of CMMC Program to DOD CIO’s office Read More
Microsoft 365 Phishing Attack Makes Comeback
Vintage cyber-attack tactic revived to phish Microsoft 365 users Read More
PRC Firm Allegedly Stole Motorola’s Secrets
Hytera Communications Corp accused of hiring Motorola employees to steal DMR technology Read More
Amy Zegart on Spycraft in the Internet Age
Amy Zegart has a new book: Spies, Lies, and Algorithms: The History and Future of American Intelligence. Wired has an excerpt: In short, data volume...
Google Cloud adds agentless threat detection to virtual machine workloads
As more enterprise computing workloads are moving to the cloud, so are the attackers. Virtual servers have been targeted by cryptomining and ransomware groups over...
How We Can All Work Together For a Better Internet
Let’s face it – we would not be the same people we are today if it wasn’t for the internet. The internet has opened our...