Table of contents
- A case for establishing a common weakness enumeration for hardware security
- Things to keep in mind when raising capital for your cybersecurity venture
- Burner phones are an eavesdropping risk for international travelers
- Hardware hacks: The next generation of cybercrime
- California’s IoT cybersecurity bill: What it gets right and wrong
- 7 signs your cybersecurity is doomed to fail in 2020
- How to test employee cyber competence through pentesting
- Smart cities are on the rise: What are the dangers?
- Modern security product certification best practices
- Why outsourcing your DPO is an effective insurance policy