Recent Posts

A jailbroken John Deere monitor running a version of the DOOM FPS

UPDATE DEF CON DOOM Patrol: Deere Jailbreak Raises Questions on Security, Competition

A researcher presented the results of a year-long effort to reverse engineer John Deere hardware to run a version of the DOOM first person shooter. He also discovered a number of security flaws along the way.

cyber word cloud

Episode 240: As Stakes Of Attacks Grow, Can Cyber Policy “Shift Right”?

In this episode of the podcast (#240) Lauren Zabierek, the Executive Director for the Cyber Project at the Belfer Center at Harvard’s Kennedy School joins us to talk about the need for a re-think of national cybersecurity preparedness, as major hacks like the attack on Colonial Pipeline put the focus on resilience and public safety.

Hybrid Work Scenes

Hybrid Work Is Here: Is Your Security Strategy Ready for It?

An “everywhere,” hybrid workforce is no longer concept, but reality. But securing hybrid workplaces requires big changes to how IT security gets done, argues Jason Lee, the CISO of Zoom in this Expert Insight.

Virus Detected Screen

The Future of Attack Surface Management: How to Prepare

Upwards of 70% of organizations have been compromised because of an unknown, unmanaged, or mismanaged visible asset. Improving your Attack Surface Management capabilities is critical, says David Monnier, a Fellow at Team Cymru.

How Vulnerability Management Has Evolved And Where It’s Headed Next

The blocking and tackling work of scan management is becoming a commodity, writes Lisa Xu, the CEO of NopSec in this Expert Insight. What organizations need now is complete visibility of their IT infrastructure and business applications.