All The Latest!
Keeping up with cyber-news is hard. Enjoy our specially curated collection of various RSS feeds to help make finding relevant news a little less tedious. If you have something to share, be sure to let us know!
Keeping up with cyber-news is hard. Enjoy our specially curated collection of various RSS feeds to help make finding relevant news a little less tedious. If you have something to share, be sure to let us know!
Stakeholders will gain deeper understanding of the many legal, regulatory, and security considerations that arise when using smart contractsSEATTLE – May 19, 2022 – The Cloud Security Alliance (CSA), …
This blog was originally published by Orca Security here. Acronyms help communicate lengthy phrases, but they can sometimes be confusing. This is especially true in the security industry, which has an …
This blog was originally published by BlueVoyant here.In the wake of Russia’s invasion of Ukraine, cyber experts predicted a surge in cyber activity. While BlueVoyant has observed an increase in repor …
Exclusive event to feature keynote presentations, networking opportunities, panel discussions, participation in three-phase attack scenarioSEATTLE – May 18, 2022 – The Cloud Security Alliance (CSA), t …
This blog was originally published by Agio here. The Internet of Things (IoT) has given us loads of valuable new devices, but it’s also created a new kind of security risk for organizations. Many peop …
Pretty. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.
“Google Maps Adds Shortcuts through Houses of People Google Knows Aren’t Home Right Now.” Excellent satire.
Locks that use Bluetooth Low Energy to authenticate keys are vulnerable to remote unlocking. The research focused on Teslas, but the exploit is generalizable. In a video shared with Reuters, NCC Group …