Data Engineering Survey Shows Security, Access Challenges#Survey#Data Access#Cybersecurity·thenewstack.io·Dec 14, 2022Data Engineering Survey Shows Security, Access Challenges
Security startup Snyk raises big money at smaller valuation#Funding#Massachusetts#Cybersecurity·axios.com·Dec 14, 2022Security startup Snyk raises big money at smaller valuation
How ChatGPT is changing the way cybersecurity practitioners look at the potential of AI#ChatGPT#Cybersecurity·scmagazine.com·Dec 10, 2022How ChatGPT is changing the way cybersecurity practitioners look at the potential of AI
What’s next in cybersecurity#Cybersecurity·technologyreview.com·Nov 28, 2022What’s next in cybersecurity
Home - cybersecurityinside.com#Podcasts#Intel#Cybersecurity·cybersecurityinside.com·Nov 21, 2022Home - cybersecurityinside.com
The Urgency To Cyber-Secure Space Assets#Space#Satellite#Cybersecurity·forbes.com·Nov 20, 2022The Urgency To Cyber-Secure Space Assets
The Cyber Defense Index 2022/23#Survey#Index#Cybersecurity·technologyreview.com·Nov 15, 2022The Cyber Defense Index 2022/23
New survey reveals $2 trillion market opportunity for cybersecurity technology and service providers#Market Research#Forecasting#Cybersecurity·mckinsey.com·Nov 12, 2022New survey reveals $2 trillion market opportunity for cybersecurity technology and service providers
NSA Releases Guidance on How to Protect Against Software Memory Safety Issues#Government#Recommendations#Cybersecurity·nsa.gov·Nov 10, 2022NSA Releases Guidance on How to Protect Against Software Memory Safety Issues
DHS Cyber Priorities for the Coming Year: A Conversation with Under Secretary Rob Silvers#DHS#Government#Cybersecurity·youtube.com·Nov 9, 2022DHS Cyber Priorities for the Coming Year: A Conversation with Under Secretary Rob Silvers
AI as national-security focus in DARPA project - Military Embedded Systems#DARPA#Development#AI#Learning#Cybersecurity·militaryembedded.com·Nov 7, 2022AI as national-security focus in DARPA project - Military Embedded Systems
Once-hot Boston cybersecurity firms still retrenching - The Boston Globe#Economics#Massachusetts#Cybersecurity·bostonglobe.com·Nov 1, 2022Once-hot Boston cybersecurity firms still retrenching - The Boston Globe
China's Cybersecurity Industry: A Market Analysis#China#Market Research#Cybersecurity·china-briefing.com·Nov 1, 2022China's Cybersecurity Industry: A Market Analysis
White House invites dozens of nations for ransomware summit#Ransomware#Government#Conference#Cybersecurity·apnews.com·Oct 31, 2022White House invites dozens of nations for ransomware summit
US to launch 'labeling' rating program for internet-connected devices in 2023#Regulation#Internet#IoT#Cybersecurity·techcrunch.com·Oct 21, 2022US to launch 'labeling' rating program for internet-connected devices in 2023
Antony Blinken’s Silicon Valley visit underscores US cybersecurity concerns#Silicon Valley#Politics#Cybersecurity·theguardian.com·Oct 20, 2022Antony Blinken’s Silicon Valley visit underscores US cybersecurity concerns
Crypto Needs More Rules and Better Enforcement, Regulators Warn#Cryptocurrency#Government#Regulation#Cybersecurity·nytimes.com·Oct 4, 2022Crypto Needs More Rules and Better Enforcement, Regulators Warn
Prompt injection attacks against GPT-3#GPT-3#Chatbot#Cybersecurity·simonwillison.net·Sep 17, 2022Prompt injection attacks against GPT-3
40% of pros scaled back back open source use over security#Opensource#Criticism#Data Science#Cybersecurity·theregister.com·Sep 15, 202240% of pros scaled back back open source use over security
Whistleblower: China, India had agents working for Twitter#Criticism#Cybersecurity#Twitter/X·apnews.com·Sep 13, 2022Whistleblower: China, India had agents working for Twitter
Elon Musk to push for Twitter geolocation data after whistleblower’s bombshell: sources#National Security#Elon Musk#Management#Cybersecurity#Twitter/X·nypost.com·Aug 23, 2022Elon Musk to push for Twitter geolocation data after whistleblower’s bombshell: sources
TikTok’s in-app browser could be keylogging, warns analysis – TechCrunch#Key Logging#TikTok#Meta#Instagram#Facebook#Cybersecurity·techcrunch.com·Aug 19, 2022TikTok’s in-app browser could be keylogging, warns analysis – TechCrunch
A Flaw in the VA's Medical Records Platform May Put Patients at Risk#EMR#Cybersecurity·wired.com·Aug 13, 2022A Flaw in the VA's Medical Records Platform May Put Patients at Risk
Spyware poses a huge threat to global human rights and democracy, warns expert | Canada#Surveillance#Canada#Cybersecurity·newsofcanada.net·Aug 9, 2022Spyware poses a huge threat to global human rights and democracy, warns expert | Canada
Thousands of hackers flock to 'Dark Utilities' C2-as-a-Service#Cybersecurity·bleepingcomputer.com·Aug 6, 2022Thousands of hackers flock to 'Dark Utilities' C2-as-a-Service
If you’re getting fake texts from scammers posing as Amazon, you’re not alone—here’s what you can do#Email#Phone#Amazon#Cybersecurity·cnbc.com·Jul 31, 2022If you’re getting fake texts from scammers posing as Amazon, you’re not alone—here’s what you can do
How governments seize millions in stolen cryptocurrency#Cryptocurrency#Blockchain#Government#Cybersecurity·technologyreview.com·Jul 28, 2022How governments seize millions in stolen cryptocurrency
The Unsolved Mystery Attack on Internet Cables in Paris#France#Internet#Infrastructure#Cybersecurity·wired.com·Jul 25, 2022The Unsolved Mystery Attack on Internet Cables in Paris
Deep learning delivers proactive cyber defense#Deep Learning#PDF#Cybersecurity·technologyreview.com·Jul 20, 2022Deep learning delivers proactive cyber defense
Web3 projects have lost more than $2 billion to hacks this year#Web3#Cryptocurrency#Cybersecurity·theverge.com·Jul 9, 2022Web3 projects have lost more than $2 billion to hacks this year