Laden...
November 06, 2019
Two CIOs explain how they view their relationships with the security function, and why CISOs need to collaborate closely with CIOs whether they report into them or not. Read more â¶
Defenders can discover phishing sites through web analytics IDs
Boeing's poor information security posture threatens passenger safety, national security, researcher says
5 keys to protect your supply chain from cyberattacks
US Department of Justice push for encryption backdoors might run afoul of First Amendment
What you need to know about the US CLOUD Act and the UK COPOA Act
What security companies â and all of us â can learn from the Deadspin debacle
Using Virtual Reality to help people access a new paradigm of mindfulness Read more â¶
Many phishing websites are now using unique user IDs (UIDs), and that gives defenders a signal to detect phishing attacks before they do much damage. Read more â¶
DEALPOST
The Complete 2019 CompTIA Certification Training Bundle features 12 prep courses on CompTIA's most useful certifications. Read more â¶
The aircraft maker failed to perform minimum due diligence in securing its networks, then tried to cover it up, security researcher Chris Kubecka tells Aviation Cyber Security conference attendees. Read more â¶
The SANS Institute recently identified the key components to keep your supply chain secure. Here's why industry experts believe they are important. Read more â¶
Is encryption code speech? Earlier court rulings suggest that it is, legally, and therefore subject to First Amendment protections. Read more â¶
A new data access agreement between the UK and US streamlines law enforcementâs ability to gain access to data held on foreign soil. Read more â¶
The recent news of the exodus of the entire editorial staff of the popular sports and culture website Deadspin sent reverberations throughout the media. But two of the biggest lessons to be learned from Deadspinâs downfall should resonate with leaders and employees of any company, in any industry. Read more â¶
© 2024