US charges Russian agents over cyber attacks on oil refineries and nuclear power plants
Compromise of safety systems could have resulted in the release of toxic gas or an explosion - causing physical damage to facilities and the loss...
Leaked hacker logs show weaknesses of Russia’s cyber proxy ecosystem
For nearly four decades, states have used proxy actors to conduct cyber operations. In doing so, they profit from diverse low-intensity efforts that harass, subvert...
Making security a more welcoming field for women
Alethe Denis was on maternity leave when she decided to participate in DEF CON's Social Engineering Capture the Flag competition in 2019. She took her...
Security Incidents Reported to FCA Surge 52% in 2021
UK financial services firms hit by breaches and ransomware Read More
What is SSL? How SSL certificates enable encrypted communication
SSL and its descendent, TLS, are protocols that encrypt internet traffic, making secure internet communication and ecommerce possible. The decades-long history of these protocols has...
What is ethical hacking? Getting paid to break into computers
Ethical hacking, also known as penetration testing, is legally breaking into computers and devices to test an organization's defenses. It's among the most exciting IT...
Making Security Simpler for Organizations Big and Small
Making security simpler as controls become integrated into organizations' zero-trust journeys is a tremendous opportunity for democratizing security. Read More
Washington Health District Suffers Another Data Breach
Phishing attacks on Spokane Regional Health District triggers two data breach announcements in 2022 Read More
US Proposes Healthcare Cybersecurity Act
Bipartisan proposal aims to protect America’s healthcare and public health sector Read More
Zero-day Attacks Doubled in 2021
Researchers find a spike in zero-day exploits and faster exploitation speeds in 2021 Read More
