The "Digital Markets: Wildlife Trafficking Hidden in Plain Sight" report from the International Fund for Animal Welfare identified over 1,100 advertisements for illegal wildlife trade and analyzed trends in the demand for and online sale of endangered species.
The program, which connects security executives to students at Mercyhurst, aims to benefit both young security professionals building their careers and executives looking for new talent.
Let's dive into what spear phishing is and how security teams can effectively tackle this very targeted method of digital attack, especially now that hackers are picking up their pace.
5G is here and redefining network architecture. Taking responsibility for its advancement in a secure manner has never been more important. Who ultimately is responsible for its associated security?
David Zambri brings 28 years of law enforcement experience to his new role at the University of Central Florida, where he previously served as Deputy Chief of Police.
As the United States continues to face attacks across critical sectors —
energy and infrastructure, healthcare, and operational technology (OT) —
a cultural shift in cybersecurity is taking place.
Increased reliance on automation and new technologies to assist with meter reading, leak detection and other operational goals have opened a host of attack surfaces. Given the ever-evolving and multi-faceted threat landscape, sharing and collaboration are essential to water and wastewater security and resilience.
Dr. Kelly Fletcher, Performing the Duties of the Department of Defense (DoD) Chief Information Officer, talks about the department's cybersecurity priorities in a rapidly changing technology landscape.
Operation GhostShell, a highly targeted cyber espionage campaign, attacks the aerospace and telecommunications industries mainly in the Middle East, with additional victims in the U.S., Russia and Europe.