How to Prevent “Smash & Grab” Cyberattacks T.J. Ramsey July 10, 2025 The best way to prevent smash & grab cyberattacks is to safeguard shared drives and implement MFA protection in a timely manner.Read More
Special Report: Women in Security 2025 Mary Carmichael: Building City-Wide Cybersecurity Taelor Sutherland July 10, 2025 Mary Carmichael has worked hard to expand cybersecurity awareness within her organization and larger community.Read More
Threat Actor Targeting Indian Defense Sector Jordyn Alger July 9, 2025 A threat actor based in Pakistan (APT36) has engaged in a sophisticated cyber-espionage campaign.Read More
OT Security Responsibility Is Elevating to Executive Leadership Jordyn Alger July 9, 2025 New research delves into the state of operational technology (OT) cybersecurity. Read More
Phishing Scams Can Deceive Large Language Models Jordyn Alger July 8, 2025 LLMs have been observed leading users to phishing links. Read More
The Internal Blast Radius of Ransomware Attacks: Why Cyber Resilience Must Start with People Dr. Darren Williams July 8, 2025 In the aftermath of an attack, the human impact inside the company can often be overlooked. Read More
Special Report: Women in Security 2025 Dr. Joye Purser: Safeguard Against Shifting Risks Taelor Sutherland July 7, 2025 Dr. Joye Purser, PhD, shares knowledge gained over her extensive security career.Read More
Special Report: Women in Security 2025 Jewel Singh: Protecting Women At All Levels of an Organization Taelor Sutherland July 7, 2025 Jewel Singh highlights her decades-long career ranging from IT to employee safety.Read More
Special Report Security’s 2025 Women in Security This year’s honorees drive meaningful change within their organizations and help to shape the future of the security industry. Rachelle Blair-Frasier July 7, 2025 This year’s Women in Security honorees drive meaningful change within their organizations and help to shape the future of the security industry.Read More
Cyber Independence: Why True Risk Analysis Requires Unbiased Assessments Barry Mathis July 4, 2025 The Fourth of July is a fitting time to reflect on another kind of independence: the critical, and increasingly endangered, independence of cybersecurity assessments and risk analyses.Read More