EPA and White House Send Water Industry Cybersecurity Warning

The Biden administration issues a cybersecurity call to action for the US water industry amid flood of cyber threats targeting essential systems This directive (see the official guidance) comes in the wake ...

Implementing Scrum for Cybersecurity Teams

How can cybersecurity teams adopt Scrum for agile and responsive best practices? Staying ahead of cybersecurity threats requires cutting-edge technology and agile and effective management practices. Enter Scrum, a framework initially designed ...

USENIX Security ’23 – Abderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran, Nguyen Phong Hoang – DeResistor: Toward Detection-Resistant Probing for Evasion Of Internet Censorship

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and ...

Cloud Repatriation Impacts on Resources and Cybersecurity

The cloud repatriation surge and the impact on SOS resources and business cybersecurity  In recent years, the cloud computing landscape has witnessed a significant yet somewhat surprising trend: cloud repatriation.   This movement ...

USENIX Security ’23 – Network Responses To Russia’s Invasion of Ukraine In 2022: A Cautionary Tale For Internet Freedom

Authors/Presenters: Reethika Ramesh, Ram Sundara Raman, Apurva Virkud, Alexandra Dirksen, Armin Huremagic, David Fifield, Dirk Rodenburg, Rod Hynes, Doug Madory, Roya Ensafi Many thanks to USENIX for publishing their outstanding USENIX Security ...

USENIX Security ’23 – Wentao Guo, Jason Walter, Michelle L. Mazurek – The Role Of Professional Product Reviewers In Evaluating Security And Privacy

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and ...

How Can CIOs Prepare Their Organizations for Generative AI?

Generative AI: A new challenge in preparing organizations and setting policies In our swiftly evolving and ‘somewhat spicey’ digital age, Chief Information Officers (CIOs) now find themselves at the helm of navigating ...

USENIX Security ’23 – Tanusree Sharma, Zhixuan Zhou, Andrew Miller, Yang Wang – A Mixed-Methods Study Of Security Practices Of Smart Contract Developers

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and ...

The Importance of Compliance Hardening

Navigating compliance hardening: A critical pillar of organizational cybersecurity Safeguarding digital assets against ever-evolving threats demands not just vigilance but a proactive stance towards compliance hardening. This approach ensures that systems are ...

USENIX Security ’23 – Pushed By Accident: A Mixed-Methods Study On Strategies Of Handling Secret Information In Source Code Repositories

Authors/Presenters: Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment ...