GUEST ESSAY: A DIY guide to recognizing – and derailing –  Generative AI voice scams

GUEST ESSAY: A DIY guide to recognizing – and derailing – Generative AI voice scams

Americans lost a record $10 billion to scams last year — and scams are getting more sophisticated. Related: Google battles AI fakers Recently used to impersonate Joe Biden and Taylor Swift, AI voice cloning ...
Who's to Blame for Hacked Social Media Accounts?

Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware

In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part. They ...
What are SBOM standards and formats?

What are SBOM standards and formats?

The growing importance of software bills of materials (SBOMs) marks a significant shift towards better transparency and security in software management ...
News alert: Badge expands availability of ‘Enroll Once and Authenticate on Any Device’ software

News alert: Badge expands availability of ‘Enroll Once and Authenticate on Any Device’ software

San Francisco, Calif., Mar. 7, 2024 — Badge Inc., the award-winning privacy company enabling Identity without Secrets™, today launched a new Partner Program and welcomed Identity Data Management and Analytics provider Radiant Logic ...
Women in cybersecurity: On the shoulders of giants

Women in cybersecurity: On the shoulders of giants

$11.5 trillion - the Gross Domestic Product (GDP) of the world's third-largest economy after the United States and China. However, this is not a country. It's the estimated cost of cybercrime to ...

Russian Hackers Target Ukraine Via A Disinformation Campaign

Disinformation campaigns play an important role in cyber warfare, and this is exactly what Russian hackers target Ukraine. After waging war on Ukraine on land, Russia is attacking the East European country ...
Browserless Entra Device Code Flow

Browserless Entra Device Code Flow

Zugspitze, Bavaria, Germany. Photo by Andrew ChilesDid you know that it is possible to perform every step in Entra’s OAuth 2.0 Device Code flow — including the user authentication steps — without a browser?Why that matters:Automating authentication flows enables ...

Pathlock Announces Release of First-of-its-Kind SAP Cybersecurity Product

Pathlock is pleased to announce the launch and general availability of its Cybersecurity Application Controls (CAC), the first-ever SAP cybersecurity product designed to safeguard business data from breaches and exploitation. This innovative ...
Embracing the AI revolution: Navigating the impact on developers

Embracing the AI revolution: Navigating the impact on developers

In the wake of transformative advancements in generative artificial intelligence (AI) and machine learning (ML), the landscape of software development is undergoing a significant shift ...
GUEST ESSAY: Essential cyber hygiene practices all charities must embrace to protect their donors

GUEST ESSAY: Essential cyber hygiene practices all charities must embrace to protect their donors

Charities and nonprofits are particularly vulnerable to cybersecurity threats, primarily because they maintain personal and financial data, which are highly valuable to criminals. Related: Hackers target UK charities Here are six tips ...

Secure Guardrails