SOAR Is Dead, Long Live SOAR
Business intelligence firm Gartner labels security orchestration, automation, and response as "obsolete," but the fight to automate and simplify security…
Business intelligence firm Gartner labels security orchestration, automation, and response as "obsolete," but the fight to automate and simplify security…
Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several…
A novel side-channel attack dubbed "RAMBO" (Radiation of Air-gapped Memory Bus for Offense) generates electromagnetic radiation from a device's RAM to…
Vendors of mercenary spyware tools used by nation-states to track citizens and enemies have gotten savvy about evading efforts to…
Adversaries reusing abandoned package names sneak malware into organizations in a sort of software shell game.
Threat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously…
Cisco's deal to acquire Robust Intelligence will make it possible to use red-team algorithms to assess risk in AI models…
Another innovative industry leader I had the pleasure of speaking with was Michael Bargury, Co-Founder and CTO of Zenity, a…
Interview with Dr. Wade Holmes, member, Cyversity Board of Directors Cyversity is a 501(c)(3) organization whose mission is to achieve…
Defending business against cyberattack Encryption of Data at Rest: The Cybersecurity Last Line of Defense In the ever-evolving landscape of…