The AT&T Phone Records Stolen
In today’s digital age, the importance of cybersecurity must be re-balanced. With increasing cyberattacks and data breaches, organizations must prioritize…
In today’s digital age, the importance of cybersecurity must be re-balanced. With increasing cyberattacks and data breaches, organizations must prioritize…
Weak and reused credentials continue to plague users and organizations. Learn from Specops software about why passwords are so easy…
The National Security Memorandum on Artificial Intelligence tasks various federal agencies with securing the AI supply chain from potential cyberattacks…
by Dan K. Anderson CEO, CISO, and vCISO With the rise of software supply chain attacks, organizations are under increasing…
Do you know where all the secrets are? The probable answer to this might be NO and believe me you…
Multiple popular mobile applications for iOS and Android come with hardcoded, unencrypted credentials for cloud services like Amazon Web Services (AWS)…
The ongoing prevalence (and rise) of software supply chain attacks is enough to keep any software developer or security analyst…
In 2024, the Federal Communications Commission (FCC) launched the K-12 Cybersecurity Pilot Program, a groundbreaking initiative backed by $200 million…
Artificial intelligence (AI) has many applications in cybersecurity. Automated fraud detection is one of the most impactful of these use…
PRESS RELEASE WASHINGTON, DC (October 15, 2024) – The Consortium for School Networking (CoSN) today announced...