News

  • Amy Zegart on Spycraft in the Internet Age

    Amy Zegart has a new book: Spies, Lies, and Algorithms: The History and Future of American Intelligence. Wired has an excerpt: In short, data volume and accessibility are revolutionizing sensemaking. The intelligence playing field is leveling­ — and not in a good way. Intelligence collectors are everywhere, and government spy agencies are drowning in data.…

    Read More

  • Google Cloud adds agentless threat detection to virtual machine workloads

    As more enterprise computing workloads are moving to the cloud, so are the attackers. Virtual servers have been targeted by cryptomining and ransomware groups over the past few years, and they typically don’t benefit from the same levels of protection as endpoints. Google has set to change that with VM-based threat detection for its cloud…

    Read More

  • How We Can All Work Together For a Better Internet

    Let’s face it – we would not be the same people we are today if it wasn’t for the internet. The internet has opened our eyes to so much information that we are privileged to have right at our fingertips. However, it’s important to remember that with so many individuals with access to the web,…

    Read More

  • Private browsing vs VPN – Which one is more private?

    As people turn to the Internet for news and answers to tough questions, it only makes sense that it would come to know you better than your closest friends and family. When we go online for answers to personal questions, we’re sharing our deepest secrets with search engines. While some people are happy to share that level of…

    Read More

  • New Research Reveals Large Salary Rises for Cybersecurity Workers

    The salary guide provided the median salaries across 10 major job roles in cybersecurity Read More

    Read More

  • A US hacker blasted North Korea off the internet following missile tests

    Last month, as North Korea’s supreme leader Kim Jong-un oversaw a series of sabre-rattling hypersonic missile tests, cyber attacks disrupted the country’s internet infrastructure. But who was responsible? Read more in my article on the Hot for Security blog. Read More

    Read More

  • Unraveling the climate change and Cybersecurity connection

    This blog was written by an independent guest blogger. Cybersecurity and climate change. These two issues seem, at least on the surface, like they couldn’t be farther apart. One conjures Matrix-like, futuristic visions of tech bros and shadowy figures hunched over laptops. The other, third-world dystopias, famine, and mass extinction. However, a deeper dive into…

    Read More

  • #SaferInternetDay: Porn Sites Face Legal Duty to Verify Age of UK Users

    #SaferInternetDay: Porn Sites Face Legal Duty to Verify Age of UK Users Pornographic websites will be legally obliged to introduce robust checks to verify the age of users under new plans published by the UK government. The measure is designed to protect children from accessing pornography from commercial providers. Announced on Safer Internet Day, the…

    Read More

  • 4 alternatives to encryption backdoors, but no silver bullet

    End-to-end encrypted communication has been a boon to security and privacy over the past 12 years since Apple, Signal, email providers, and other early adopters first started deploying the technology. At the same time, law enforcement authorities around the globe have pushed for technological solutions to pry open the chain of protected end-to-end encrypted content,…

    Read More

  • 7 top challenges of security tool integration

    Enterprises are frequently deploying new security tools and services to address needs and threats. A key consideration is how to integrate these various offerings—in many cases provided by different vendors—into the existing infrastructure to support a cohesive security strategy. The move to the cloud has made security integration somewhat easier, but the process can still…

    Read More