Infosec pros still struggling to define and manage cyber-risk
#RSAC: The Changing Work of the Cyber-Threat Intelligence Community
The need for new approaches to improve cyber-threat intelligence was highlighted during a keynote at the RSA conference
Buyer and Seller Power Dynamics in Acquisitions
You can find a lot of discussions about the selling process, but you don’t find a lot of conversation of power dynamics. Background: In 2017 I sold my company to GoDaddy. I was an executive at GoDaddy for three years post-acquisition where I spen…
Critical Vulnerability Found in Motorola’s Unisoc Chips
Checkpoint Research spotted a critical vulnerability in Unisoc Tiger T700 chips in three Motorola models
Do I have to take most of my annual leave in August in Spain?
Many Spanish companies still expect their workers to take their holidays at specific times of the year, primarily in August, right in the height of summer when many hotels are fully booked. So are you forced to take your vacation in one pa…
State-Backed Hacker Believed to Be Behind Follina Attacks on EU and US
An unnamed state actor is behind a phishing campaign targeting European and local US government entities
Akamai: Protecting Life Online with Secure Internet Access
Easily deliver value-added security services to families and businesses with Akamai Secure Internet Access services for ISPs and MNOs.
10 Years Since World IPv6 Launch
A decade past World IPv6 Launch and we are well through the migration away from legacy IPv4, but still have a long way to go.
Gloucester Council IT Systems Still Not Fully Operational Six Months After Cyber-Attack
The authority said its servers were compromised on December 20 last year
The Next Generation of HTTP
The IETF just released HTTP/3, an update to HTTP that leverages new transport protocol QUIC. Learn about how the new RFCs can affect any references to HTTP.