NCSC has already taken down 300,000 URLs connected to such scams
“Hacker Princess” Wins (ISC)² Diversity Award
Kristin Paget scoops gong for driving a more diverse cybersecurity workforce
US Court Orders Defendant to Unlock Phones
New Jersey’s highest court rules defendant must share his phones’ passcodes with law enforcement
CactusPete Targets Eastern European Military
APT group spies on financial and military organizations in Eastern Europe
Phishing Tactic Targets Verizon Users’ Credentials
Phishing attack targets and collects Verizon user credentials
IT Pros Name Misconfiguration #1 Cloud Security Threat
Check Point report reveals skills shortage is biggest barrier to adoption
CASB Complexity Means Many Products Are Under-Utilized
Cloud Security Alliance claims in-house skills are also lacking
Open Source Supply Chain Attacks Surge 430%
Sonatype warns of OSS dependencies and vulnerable components
Human Error Threatens Cloud Security
Majority of security professionals believe human error could expose cloud data
FireEye Announces Bug Bounty Program
California cybersecurity company launches public bug bounty program