- U.S. DOJ will no longer prosecute good-faith security researchers under CFAA
- 5 critical questions to test your ransomware preparedness
- Why cyber security can’t just say “no“
- Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more!
- BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones
Videos
- BigBear.ai names Tony Barrett as President of the Cyber and Engineering Sector
- Workato expands leadership team with new appointments
- CyberSheath launches partner program to help DIB companies achieve CMMC compliance
- Microchip Precise Time Scale Systems enables traceability to UTC without depending on GNSS
- PlainID partners with PwC to help enterprises manage authorization policies
- Review: Group-IB Threat Intelligence & Attribution (TI&A)
- Review: Group-IB Digital Risk Protection
- Review: The Pentester Blueprint: Starting a Career as an Ethical Hacker
- Review: Group-IB Threat Hunting Framework
- Review: Code42 Incydr – SaaS data risk detection and response
- Review: Alice & Bob Learn Application Security
- Download guide: Evaluating third-party security platforms
- How to enhance your cyber defense program with CIS SecureSuite
- eBook: A new breed of endpoint protection
- Download: CISO’s guide to choosing an automated security questionnaire platform
- State of Pentesting 2022 report: Interactive event and open discussion
- Open XDR: Balancing risk and cybersecurity costs through a unified platform approach