Energetic DragonFly DYMALLOY Bear 2.0

New research from Cylance identifies for the first time the use of a compromised core router as one of the tools wielded by the threat actor that has recently been accused by the United States government of acting in the interests of Russia to attack government agencies and organizations in the “energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors.”
Read more

What Infosec Can Learn from Pro Sports

Absent a national draft for bringing new talent into infosec teams and without a transparent free agency, we have social networks like LinkedIn where talent quietly signals they are ready for a change and recruiters act in a sub rosa manner to get key talent into open positions. The opposite is also true. But what about the employer? Shouldn’t the employer be working to improve their infosec team every day?
Read more
Page 1 of 2412345...1020...Last »