Microsoft's Defending Ukraine report offers fresh details on digital conflict and disinformation
Russia will use what it learned from its destructive cyber actions in Ukraine for other operations. "There is no going back to normal."
Russia will use what it learned from its destructive cyber actions in Ukraine for other operations. "There is no going back to normal."
The re-emergence of REvil and anticipated convergence with business email compromise actors are among reasons why ransomware gangs are still dangerous.
Attendees urged to improve asset management, use SBOMs, and collaborate with government cyber security agencies to better ensure software integrity.
Modern agriculture depends on internet-connected machinery that is centrally controlled and collects and analyzes massive amounts of data, making it an inviting target for threat actors.
Bounties as high as $10 million dollars make hunting cryptocurrency vulnerabilities lucrative for those with the proper skillsets.
Research reveals that countries such as Belarus, India, and Columbia are responsible for significant cyber attacks.
Researchers explain how they identified -- or failed to identify -- the threat actors behind three high-profile incidents and why attribution is so difficult.
The Personal Information Protection Law will force global companies doing business in China to be more careful with cross-border flow of personal information.
Experts argue that Apple is clearing a path for governments to gain access to their citizens' data--essentially an encryption backdoor.
The guidance seeks to educate IT administrators about cloud security risks and best practices for implementing and maintaining Kubernetes.
Under pressure to end the ransomware scourge, the White House faces strong headwinds. The problem: Putin has no motivation to change the status quo.
The successful seizure could encourage other victims to better cooperate with federal agencies and cause ransomware gangs to rethink their operations.
More permanent remote workers, requirements for protecting health data, and a more dangerous threat landscape await security teams as the COVID crisis ends.
Two-way communication between government and the private sector combined with a national breach notification policy will put a dent in cyber crime.
Though lacking in clarity, this new executive order might be more effective than past efforts, especially in the wake of the Colonial pipeline attack.
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.
EDGE is the leading technology conference for business leaders in Australia and New Zealand, built on the foundations of collaboration, education and advancement.