KrebsOnSecurity
Internet Security Alliance
- THOUGHTS ON SECURITY BY DESIGN/DEFAULT FOR WORLD ECONOMIC FORUM
- WHITE HOUSE SHOULD LOOK TO BOARD’S GUIDENCE ON AI AND CYBERSECURITY – PART 2
- WHITE HOUSE SHOULD FOLLOW BOARD’S GUIDANCE ON NEW AI EXECUTIVE ORDER
- THE KEY TO UNDERSTANDING SYSTEMIC CYBER RISK IS MARKET PENETRATION
- COMMERCIAL ECONOMICS ARE INSUFFICIENT TO DEFEND CRITICAL INFRASTRUCTURE FROM CYBER ATTACKS
Schneier on Security
JMBM Cybersecurity Lawyer Forum
Error: Feed has an error or is not valid.
Steptoe Cyberblog
- Cybersecurity Awareness Month: Stay Compliant in an Evolving Cybersecurity Legal Landscape
- GDPR Enforcement Update: July-August 2023
- Landmark Judgment from the CJEU for Online Operators Whose Business Model Is Dependent on Personalized Content and Advertisement
- Courts Pump Brakes on Privacy Rights; California Attorney General Responds with Investigative Sweep
- European Commission Proposes New GDPR Procedural Rules for Cross-Border Cases
Bank Info Security
Error: Feed has an error or is not valid.
CPO Magazine
Error: Feed has an error or is not valid.
Omnistruct
WeLiveSecurity by eset
- Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals
- What makes Starmus unique? A Q&A with award-winning filmmaker Todd Miller
- How technology drives progress – A Q&A with Nobel laureate Michel Mayor
- The vision behind Starmus – A Q&A with the festival’s co-founder Garik Israelian
- Protecting yourself after a medical data breach – Week in security with Tony Anscombe
Security Intelligence by IBM
- NIST’s role in the global tech race against AI
- Researchers develop malicious AI ‘worm’ targeting generative AI systems
- Passwords, passkeys and familiarity bias
- Unpacking the NIST cybersecurity framework 2.0
- What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?
Naked Security by Sophos
Threatpost
Dark Reading
- New Research Suggests Africa Is Being Used As a 'Testing Ground' for Nation State Cyber Warfare
- MITRE's Cyber Resiliency Engineering Framework Aligns With DoD Cyber Maturity Model Cert
- Philippines Pummeled by Assortment of Cyberattacks & Misinformation Tied to China
- Jason Haddix Joins Flare As Field CISO
- Thousands of Qlik Sense Servers Open to Cactus Ransomware
Ars Technica
- Hackers try to exploit WordPress plugin vulnerability that’s as severe as it gets
- Apple releases eight small AI language models aimed at on-device use
- Millions of IPs remain infected by USB worm years after its creators left it for dead
- School athletic director arrested for framing principal using AI voice synthesis
- Nation-state hackers exploit Cisco firewall 0-days to backdoor government networks
Tech Republic
- BeyondTrust Report: Microsoft Security Vulnerabilities Decreased by 5% in 2023
- OpenAI’s GPT-4 Can Autonomously Exploit 87% of One-Day Vulnerabilities, Study Finds
- Women in Cybersecurity: ISC2 Survey Shows Pay Gap and Benefits of Inclusive Teams
- Get a Lifetime Subscription of FastestVPN for just $40
- Prompt Hacking, Private GPTs, Zero-Day Exploits and Deepfakes: Report Reveals the Impact of AI on Cyber Security Landscape
CSHub
Error: Feed has an error or is not valid.
The Record
- FBI: Fraudsters using fake online dating verification apps to scam lovers
- Know-your-customer executive order facing stiff opposition from cloud industry
- Hackers accessed more than 19,000 accounts on California state welfare platform
- Congress picked a direct fight with ByteDance and TikTok. The privacy implications are less clear.
- Kaiser’s website tracking tools may have compromised data on 13 million customers