Some call it spam. Others call it marketing. Recipients want it to stop, while senders are looking to perfect their “art.” ...
One of the scariest acronyms in a CISO’s knowledge base is APT – Advanced Persistent Threat. This term refers to someone ...
One of the scariest acronyms in a CISO’s knowledge base is APT – Advanced Persistent Threat. This term refers to someone determined to harm you and can do so in sophisticated ways. A colleague once ...
I’m not cool and neither are you. Ok, so it’s been a long time – but we’re good August 1st 2022 was our last show. The next ...
Whenever a government agency, contractor, or subcontractor wants to work with a cloud service provider, they have to find one ...
RBI has issued comprehensive master directions and guidelines for banks and non-banking financial corporations to identify ...
Celebrate 10 years of BSides Knoxville, featuring discussions of AI in security, historical hacking, and holistic protection, ...
Nic Finn Setting the Stage Organizations looking to develop an increasingly proactive defensive strategy are beginning to ...
Overview Recently, we identified several critical Pwn Request vulnerabilities within GitHub Actions used by the Rspack ...
As DDoS attackers become more sophisticated and the attack surface grows exponentially, businesses must expand beyond an ...
What is Business Email Compromise? Business Email Compromise (BEC) is a sophisticated form of cybercrime where attackers use ...
Our new Third Party Risk Assessment app, TPRA. And it’s now available to current customers! Observable third-party risk ...