Published 31 October 2019 Share page About sharing Image source, David Rimmer Image caption, David Rimmer says firms must consider the impact of data breaches on employees By Sooraj Shah Technology of
I've been busy this past year which has resulted in almost no updates to this site. Consider this one of many rants/posts of my experience/s in the industry during this time. This post covers a topic
HD Moore, famed developer of the wildly popular Metasploit penetration testing tool, is about to go commercial with a new project he originally envisioned would give him a nice break from security. Mo
One of the most senior officials tasked with protecting U.S. critical infrastructure says that the lack of security professionals in the U.S. is one of the leading threats to national cybersecurity. S
I’ve seen it claim more than enough victims throughout my career. Some of the top performers in the industry have been consumed by it, yet few speak about it. Yes, there is a silent epidemic within th
While much of the attention around California’s recently passed Assembly Bill 5 (AB5) has focused on the future for Uber and Lyft drivers, bug bounty contractors working in California could also argue
Nearly 80% of global organizations now rank cyber-risk as a top-five business concern, but just 11% are highly confident they can assess, prevent and respond effectively to attacks, according to new r
A first-of-its-kind cyberattack on the U.S. grid created blind spots at a grid control center and several small power generation sites in the western United States, according to a document posted yest
Ransomware Attacks Are Testing Resolve of Cities Across America Computers were shut down at the E.M. Gilliam Memorial Library following a ransomware attack in Wilmer, Tex. Credit... Cooper Neill for T
In an unnerving twist, when a critical zero-day vulnerability was reported in a Unix administration tool, called Webmin, it was revealed the flaw was no accident. According to researchers, the vulnera
Wired UK/Shuttershock A rash of supply chain attacks hitting open source software over the past year shows few signs of abating, following the discovery this week of two separate backdoors slipped int
In a world of changing technology, there are few constants - but if there is one constant in security, it is the rhythmic flare-up of discussions about disclosure on the social-media-du-jour (mailing
WSJ News Exclusive Markets Cybersecurity employees reported what they saw as staffing issues and other problems to bank’s internal auditors, human-resources department and other senior executives Upda