3 strategies for addressing sensitive legal cybersecurity issues
In this op-ed, two expert attorneys gives some advice on how to keep cyber risks from turning into legal risks.
European police bust Polish gang suspected of hacking and stealing cars
It's the latest evidence of how digitally connected cars open up new pathways for theft.
Fixing supply chain vulnerabilities should be a team effort
Over time, the hope is that we can start building connected devices with a security-first approach.
How spies used LinkedIn to hack European defense companies
It's a cautionary tale in the use of social engineering for espionage.
Computer network ‘disruption’ forces Honda to cancel some production
Honda IT personnel are still working the incident. Outside analysts suspect ransomware.
Trust us, information sharing can work. Here’s how we’re doing it.
Opinion: Why is information sharing so hard and why are we still working on it? The Cyber Threat Alliance has some ideas.
EasyJet announces breach impacting 9 million people
Emails and password credentials lifted in prior breaches still are a popular hacking technique.
500,000 victims pummeled in multi-stage BitBucket malware scheme
The number of malware types deployed is "unprecedented," according to Cybereason.
Duo CEO Dug Song: We have to make security simple
"We need to re-design our security experiences and workflows into things that can easily be adopted by users," Song says. "Because if there’s friction, they will find a different path."
Cybersecurity’s warranty challenge
Enterprises are facing a tough choice: patch a system and break a warranty or leave a vulnerability to be fixed by an equipment manufacturer?