Source
DARKReading
A decentralized future is a grand ideal, but secure management of private keys is the prerequisite to ensure the integrity of decentralized applications and services.
Cyber-researchers are testing the bounds of optical attacks with a technique that allows attackers to recover voice audio from meetings if there are shiny, lightweight objects nearby.
The Budapest Convention is a multinational coalition that agrees to share electronic evidence across international jurisdictions to track down cybercriminals.
In a keynote address at Black Hat Asia in Singapore this week, CISO and former NASA security engineer George Do discussed his go-to model for measuring security effectiveness – and getting others in the organization to listen.
The conference opens with stark outlook on the future of global democracy — currently squeezed between Silicon Valley and China.
The White House and tech industry pledge $150 million over two years to boost open source resiliency and supply chain security.
A brand-new attack vector lays open enterprise data lakes, threatening grave consequences for AI use cases like telesurgery or autonomous cars.
Three RSA 2022 sessions take deep dives into the security considerations around data cloud transformation.
The group that shut down the second largest city in Greece was not new but a relaunch of DoppelPaymer.
A team of university researchers finds a machine learning-based approach to generating HTTP requests that slip past Web application firewalls.