77% of IT leaders are confident in their ability to prevent or mitigate a ransomware attack
ExtraHop’s report shows that however capable IT organizations have been in managing the dramatic transformations of the past couple of years, confidence still tends to …
Bad actors improving efforts to evade and fool both traditional and AI-based defenses
Deep Instinct Threat Research team monitored attack volumes and types to predict where the future of cybersecurity is heading, find out what motivates attackers, and to lay …
Video surveillance systems market to grow steadily by 2026
The video surveillance systems market is expected to grow at a CAGR of 10.06% over the forecast period 2021 to 2026, according to ResearchAndMarkets. Commercial segment is to …
AI can alter geospatial data to create deepfake geography
A fire in Central Park seems to appear as a smoke plume and a line of flames in a satellite image. Colorful lights on Diwali night in India, seen from space, seem to show …
Video: TinyNuke botnet explained
In the videos below, McAfee Labs show the setup requirements for installing and deploying TinyNuke. They review the available features of TinyNuke through the control panel, …
Laws, regulations and contracts that infosec pros should be familiar with
If you’re a white hat and you want to continue being one, knowing what laws and industry regulations allow or not allow (or require or not require) you to do is of …
Tips for evolving your office’s security culture
Changing a corporate security culture, or even just that of your own office or department, can sometimes seem impossible. In general, people don’t like change: they just …
Documentaries about an expert convicted of leaking classified information
Stephen Kim was a top level state department intelligence analyst. He went to prison under the Espionage Act. The Surrender The Surrender intimately documents Stephen Kim’s …
Video: Trust in the Cloud panel
Here is video recording of a “Trust in the Cloud” panel which was a part of the Rackspace::Solve NYC event held last Thursday. Rackspace Security leader David …
Imperfect algorithms threaten democracy
Do we want algorithms that we can’t understand or question to influence how we get to live our lives? Unfortunately, as Cathy O’Neil, well-known mathematician and …
Video: General Data Protection Regulation, Safe Harbor Agreement, Copyright reform and the Google case
After having been ruled invalid by the ECJ, the Safe Habor Agreement is now back in the spotlight as the Commission has finally issued a communication on the Trans-Atlantic …
Car hacking via compromised car diagnostic tools
Car hacking is a topic that has received considerable attention from security researchers in the last year or so, and the general public and (hopefully) lawmakers are finally …