Creating the right level of response for insider threats
With the growth of phishing attacks and compromised credentials, organizations need modern security tools to better identify insider threats says security exec Tommy Todd.
Well-funded, organized attacks require strategic counter-defense strategies
This year’s high-profile supply chain attacks underscore the gravity of lateral threats. Splunk’s Yassir Abousselham says zero trust and SOC modernization strategies are key.
GAO: Cyber Command is overspending on data tools
The project is going to cost five times more than what military officials originally estimated.
Top Secret documents show Cyber Command's growing pains in its mission against ISIS
Newly released documents show U.S. Cyber Command had its struggles in taking down ISIS infrastructure in 2016.
Sen. Menendez questions Twitter about former employees spying for Saudi Arabia
The Ranking Member of the Senate Foreign Relations Committee wants to hold Twitter and the Trump Administration to account.
A GDPR ripple effect will help bring internet privacy back from the dead, Jon Callas predicts
Jon Callas, a computer security expert who left Apple for the ACLU last year, said Monday it’s become too easy to become nihilistic about personal privacy because of the last decade of negative headlines about corporate data collection.