Top Stories

As Mobile Fraud Rises, The Password Persists

A new study released by Incognia that measures user friction in mobile financial apps yields important results about the fate of the password.

Hooded Hacker Concept Image

Spotting Hackers at the Pace of XDR – From Alerts to Incidents

Extended Detection and Response (XDR) technology is gaining traction within enterprises. But how can organizations handle the increased volume of alerts XDR systems produce? Samuel Jones, of cyber AI firm Stellar Cyber, discusses how embracing incident-based systems can reduce the analyst burden of XDR technology, enabling companies to spot and respond to attacks more quickly.

autonomous vehicles on the road

Encore Podcast: Is Autonomous Driving Heading for a Crash?

Elon Musk is a big fan of his company’s Fully Self Driving software. But is it safe? In this encore edition of the podcast from 2018, we speak with Beau Woods of The Atlantic Council about the risks of embracing autonomous driving technology too quickly.

Pride Summit 2021

At Pride Summit: A Warning On Cyber Literacy

Poor cyber literacy is at the root of many of the cybersecurity problems plaguing the U.S. economy, according to Dr. Alissa Abdullah, Deputy CSO at MasterCard.

Cartoon of Man Staring at Monitor

Episode 220: Unpacking The Kaseya Attack And Securing Device Identities on the IoT

In this episode of the podcast, sponsored by Trusted Computing Group we dig deep on this week’s ransomware attack on the Kaseya IT management software with Adam Meyers of CrowdStrike and Frank Breedijk of the Dutch Institute of Vulnerability Disclosure. Also: Tom Laffey, a product security strategist at Aruba, a Hewlett Packard Enterprise firm, and co-chair of the Network Equipment working group at TCG about how that group is adapting its technology to make it easier for new generations of connected devices to attest to their integrity.