While several large cities in the US are rolling out 5G networks, before we get to a world with the widespread use of 5G, a lot obviously needs to be worked out with the security around it too. Hailed initially as an ultra-secure protocol, one...
The Border Gateway Protocol is vulnerable to malicious actors -- and as of right now, little can be done about it from a security perspective, although there have been attempts to make it more reliable. Despite the apparent risk, last week's Black...
A leading cybersecurity luminary argues that more technically-educated individuals must come forward to do the work necessary to ensure government tech policies are informed by trained, technical-minded professionals.
Used by Lyft, among others, Capsule8's platform automates a lot of tedious manual work involved in securing enterprise infrastructure.
Old data may not be of much value to a business, but it can command top bitcoin on the dark web
The idea that ransomware attack vectors now include direct attacks on your NAS is extremely unsettling. Here's how to deal with one variant: eCh0raix.