Why is ransomware still exploiting bugs reported before 2015 - because people aren't patching them
Developers won't stop putting passwords and decryption keys directly in their source code. Shouldn't we expect better in 2019?
CISOs must address their blind spot regarding cyber-risk mitigation in the ICS and OT environment
Offering outstanding user experiences and technology interfaces is key to attracting customers
As cyber-attacks change in severity and scope, the concept of hacking back must change with it
Spyware threatens to undermine democracy, even as it catches crooks. Is it time to regulate it?
It’s time to master the basics and ensure everyone has access to the right knowledge and tools
The recent Capital One breach is an ideal case study to learn from