
Cybersecurity in 2022: It’s Not Getting Easier
As we wrap up the year, it always makes sense to take a look back and see what worked and what didn’t; what we can do better and what we have to ...

Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 422’
via the respected security expertise of Robert M. Lee and the superlative illustration talents of Jeff Haas at Little Bobby Comic Permalink ...

A Former FBI Agent’s Thoughts: National Cybersecurity Strategy
The government just released its new National Cybersecurity Strategy built around five pillars: Pillar One: Defend Critical Infrastructure Pillar Two: Disrupt and Dismantle Threat Actors Pillar Three: Shape Market Forces to Drive ...

How to Ensure Your Development Complies With SOC 2
Discover what you need to know from a development point of view for SOC 2 compliance. The post How to Ensure Your Development Complies With SOC 2 appeared first on Scytale ...

The AI Risk Landscape: How ChatGPT Is Shaping the Way Threat Actors Work
Flashpoint assesses that ChatGPT will lower the barrier to entry for basic hacking tasks, such as scanning open ports, crafting phishing emails, and deploying virtual machines for low-sophisticated threat actors. The post ...

USENIX Security ’22 – ‘Security At The End Of The Tunnel: The Anatomy Of VPN Mental Models Among Experts And Non-Experts In A Corporate Context’
Complete Title: 'USENIX Security '22 - Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets - ‘Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts ...

Industry 4.0 vs. Smart Factory: What Will the Future Look Like?
It isn’t easy to imagine the process that brings all our things into being. Just think about the journey your computer made from parts in a The post Industry 4.0 vs. Smart ...

How Hackers are Exploiting Cloud Organizations | Eureka Security
Protect your organization from data breaches in the cloud. Learn how hackers are accessing sensitive data and growing in their sophistication. | Eureka Security ...

Why You Should Opt Out of Sharing Data With Your Mobile Provider
A new breach involving data from nine million AT&T customers is a fresh reminder that your mobile provider likely collects and shares a great deal of information about where you go and ...

Six Ways to Foster a Security Mindset in Engineering Teams
Human error can be found at the root of the vast majority of cybersecurity breaches. According to Verizon’s 2022 Data Breach Investigations Report, 82% of global cybersecurity incidents included some level of ...