Big Data
SecurityISC2 Security Congress 2024: The Landscape of Nation-State Cyber Attacks
CISA advisor Nicole Perlroth closed out ISC2 Security Congress’ keynotes with a wake-up call for security teams to watch for nation-state-sponsored attacks.
Megan Crouse is a writer and editor with nearly a decade of experience in business-to-business news and feature writing. She studied English Literature and Creative Writing at Fairleigh Dickinson University.
ExpertiseMy LG NanoCell 85 TV makes relaxing with a video game after work feel like going to a movie theater in the best way.
CISA advisor Nicole Perlroth closed out ISC2 Security Congress’ keynotes with a wake-up call for security teams to watch for nation-state-sponsored attacks.
Attackers launched 600 million threats on Microsoft customers daily in the last year, according to the tech giant.
An IT and security compliance analyst distilled seven ways to forge effective synergies between IT and broader business goals.
Getting buy-in can be difficult. Safe-U founder and CEO Jorge Litvin explains how to create a common language between the CISO and the rest of the C-suite.
Microsoft’s Siva Sundaramoorthy provides a blueprint for how common cyber precautions apply to generative AI deployed in and around security systems.
SentinelOne’s Alex Stamos sees a future where defenders have the advantage when it comes to generative AI. At least until it can write exploit code.
From commercial devices to data centers, AMD continues to try to knock Intel and NVIDIA down the leaderboard of heavy-duty AI processors.
Investigation of the use-after-free flaw is ongoing, but organizations and individual users can update Firefox now for a fix.
Creating new accounts under fake identities provides attackers with a way to launder money or commit fraud.
An attacker snuck in by creating two new user accounts. Fidelity assures customers their investments aren’t affected.