Occasionally, I will come across an article or blog that I feel is valuable enough to archive. It may be on a new approach to something, a piece that provides a fundamental understanding of a topic, or just some article that I think is critical reading for some reason or another. The Reading Room will be such a collection of articles.
A video Q&A with Andreas Antonopoulos dealing with Google’s recent comments on Quantum supremacy and the impact to Bitcoin and legacy encryption. Share!
Black Hat USA 2019, Rebecca Lynch ‘s ‘Woke Hiring Won’t Save Us: An Actionable Approach To Diversity Hiring And Retention’
Thanks to Black Hat for publishing the Black Hat 2019 tremendous conference videos on their YouTube Channel Permalink The post Black Hat USA 2019, Rebecca
Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar YouTube video (transcript included). Share!
Advanced Persistent Threats groups were once considered a problem that concerns Fortune 100 companies only. However, the threat landscape of the recent years tells otherwise—in
By Ian Trump If you ask mid-and-advanced-career information security professionals about their jobs in information security, most of them may not express the kindest sentiments.
In fact, now it is easier than ever for hackers to perform such hacks into a variety of applications, just using their voice. Leveraging voice-command …
Back in 1996, a quantum physicist at Bell Labs in New Jersey published a new recipe for searching through a database of N entries. Computer …
Security BSides London 2019, Olga Zilberberg’s ‘Understanding Stress, Anxiety And Depression And How To Cope’
Many thanks to Security BSides London for publishing their outstanding conference videos on YouTube. Permalink The post Security BSides London 2019, Olga Zilberberg’s ‘Understanding Stress,
Quantum computing technology is shrouded in myth and mystique – which is understandable when you consider the clichés bandied around when … Share!
It’s a reality of the threat landscape today that most attacks rely on or exploit privileged access management in some way. A recent report claims
Todd Fitzgerald wrote the books on being a chief information security officer. Here he offers tips on what to do and what not to do
An introduction to the MITRE ATT&CK framework and how it can help organize and classify various types of threats and adversarial behaviors. The post What
Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar replay. Share!
Implementing game mechanics and competition into the mix can incentivize employees to improve their cybersecurity posture. Share!
By Owais Sultan Privileged accounts have access to the most valuable corporate information, which is why they are often targeted by attackers. This is a
Quantum mechanics often has difficulty breaking through to the general public, which is where the importance of “Schrödinger’s Cat” lies. The thought … Share!
Our phones hold a plethora of important, private information about our personal lives, and it’s not just their contents that matter. Share!
Dead or alive, left-spinning or right-spinning—in the quantum world particles such as the famous analogy of Schrödinger’s cat can be all these things at the
What is quantum computing? Quantum computers shine when solving involves number or data crunching with huge amounts of inputs. They are … Share!
To improve the security posture of our organizations, we must open our eyes to rationalization and put an end to it with logic. Here’s how.
Teams need to manage perceived risks so they can focus on fighting the real fires. Share!
Adopting zero-trust and micro-segmentation as core design principles can help improve the security posture of your network and attached systems. However, it is important to
Successful cybersecurity attacks can be so severe that they shut down business operations, erode the public’s trust in an organization and require substantial financial resources
Staying on top of the latest cybersecurity risks and preferred attack methods can feel impossible, but standards like FIDO2 are designed to help relieve the
Researchers from Los Alamos National Laboratory have created a new quantum computing algorithm that helps gain better insights into the … Share!
I found this post on my computer. I can’t remember where it originally was posted (if it was at all), but I found it useful
Privilege escalation in the Windows OS environment has always been somewhat of a trivial matter — as in it’s pretty easy to do. Share!
Forbes contributor Kalev Leetaru argues that “the encryption debate is already over — Facebook ended it earlier this year.” The ability of encryption to shield
This last week, the Attorney General William Barr called for crypto backdoors. His speech is a fair summary of law-enforcement’s side of the argument. In this
One of the most important parts of a web application is the authentication mechanism, which secures the site and also creates boundaries for each user
Quantum computers, cryptography and encryption are a potent mix, especially because quantum computers could eventually give attackers a practical … Share!
The fileless code injection technique called Process Doppelgänging is actively being used by not just one or two but a large number of malware families
5G is the next generation of wireless networks, building upon existing 4G Long-Term Evolution (LTE) infrastructure and improving the bandwidth, capacity, and reliability of wireless
The science of cybersecurity is starting to permeate the discussions of thought leaders in the cyber realm. After all, attacks based on APTs (advanced persistent
CISOs spend much less time in their role than other members of the boardroom. It’s a serious problem that must be addressed. Share!
Threatpost catches up with David Baker, the chief security officer at Bugcrowd, about the future of bug bounty programs. Share!
Organizations around the world are wondering how to become immune from cyber attacks which are evolving every day with more sophisticated attack vectors. IT teams
This is the third in a series of explainers on quantum technology. The two others cover quantum computing and quantum communication. Few of us … Share!
For organizations today, staying competitive means undergoing rapid digital transformation, yet few appear to have a solid approach for handling the security and privacy implications