CISA warns APT groups targeting US think tanks

CISA warns APT groups targeting US think tanks

CISA warns APT groups targeting US think tanks | 2020-12-03 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Tighter identity and asset management is essential to WFH security

Tighter identity and asset management is essential to WFH security

Tighter identity and asset management is essential to WFH security | 2020-12-03 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Turla Crutch attacks Ministry of Foreign Affairs in an EU country, misuses Dropbox in cyber-espionage

Turla Crutch attacks Ministry of Foreign Affairs in an EU country, misuses Dropbox in cyber-espionage

Turla Crutch attacks Ministry of Foreign Affairs in an EU country, misuses Dropbox in cyber-espionage | 2020-12-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

5 minutes with David Bodnick – Is the California Privacy Rights Act (CPRA) effective?

5 minutes with David Bodnick – Is the California Privacy Rights Act (CPRA) effective?

5 minutes with David Bodnick – Is the California Privacy Rights Act (CPRA) effective? | 2020-12-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Huntsville schools close for the week amid cyberattack

Huntsville schools close for the week amid cyberattack

Huntsville schools close for the week amid cyberattack | 2020-12-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

NSA announces winner of 8th Annual Best Scientific Cybersecurity Research Paper Competition

NSA announces winner of 8th Annual Best Scientific Cybersecurity Research Paper Competition

NSA announces winner of 8th Annual Best Scientific Cybersecurity Research Paper Competition | 2020-12-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Mind the gap: Diversity & other challenges in the age of AI

Mind the gap: Diversity & other challenges in the age of AI

Mind the gap: Diversity & other challenges in the age of AI | 2020-12-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Analyzing the draft standard contractual clauses

Analyzing the draft standard contractual clauses

Analyzing the draft standard contractual clauses | 2020-12-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

End of year security career reflections

End of year security career reflections

End of year security career reflections | 2020-12-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Hackers exploiting MobileIron vulnerability

Hackers exploiting MobileIron vulnerability

Hackers exploiting MobileIron vulnerability | 2020-11-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 117 118 119 120 121 129