All The Latest!

Keeping up with cyber-news is hard. Enjoy our specially curated collection of various RSS feeds to help make finding relevant news a little less tedious. If you have something to share, be sure to let us know!

CSA Feed

  • An Interview with One of the Developers of CSA’s Zero Trust Training
    November 22, 2022

    These days, Zero Trust is a term that you can’t seem to get away from – and you shouldn’t want to! Zero Trust is based on the principle that no part of a computing and networking system can be implici …

  • Web 3.0 Security Issues: What Your Company Needs to Know for 2023
    November 21, 2022

    Originally published by TokenEx. Written by Anni Burchfiel, TokenEx. The world wide web had its first major shift when blogging and forum capabilities were added to web alongside the established colle …

  • Cloud First, Security Second?
    November 21, 2022

    Originally published by Thales. Written by Chad Couser, Director, Marketing Communications, Thales. Cloud solutions were a lifesaver for organizations during the height of the COVID-19 pandemic as emp …

  • Removing the Fog from Cloud Compliance
    November 21, 2022

    Originally published by Axonius. Written by Shlomit Alon, Axonius. “When I was told our company needs to ensure we’re cloud compliant, I was scratching my head, unsure where to begin.”Does that quote …

  • CCSK Success Story: From an IT and Cloud Security Manager
    November 18, 2022

    This is part of a blog series interviewing cybersecurity professionals who have earned their Certificate of Cloud Security Knowledge (CCSK). In these blogs we invite individuals to share some of the c …

Tech Target

Schneier On Security

  • The US Has a Shortage of Bomb-Sniffing Dogs
    November 23, 2022

    Nothing beats a dog’s nose for detecting explosives. Unfortunately, there aren’t enough dogs: Last month, the US Government Accountability Office (GAO) released a nearly 100-page report about working …

  • Apple’s Device Analytics Can Identify iCloud Users
    November 22, 2022

    Researchers claim that supposedly anonymous device analytics information can identify users: On Twitter, security researchers Tommy Mysk and Talal Haj Bakry have found that Apple’s device analytics da …

  • Breaking the Zeppelin Ransomware Encryption Scheme
    November 21, 2022

    Brian Krebs writes about how the Zeppelin ransomware encryption scheme was broken: The researchers said their break came when they understood that while Zeppelin used three different types of encrypti …