Cybersecurity

Mitre ATT&CK News

Explore the latest news articles and reports about the Mitre Attack Framework, a curated knowledge base that helps network defenders learn exactly how networks are attacked. Discover everything about it and its place in the world of cybersecurity.


#security #operationaurora #infosec #CyberSecurity #google #informationsecurity
Two-factor authentication, Security, Attack, Authentication, Computer security, Existential quantification

@runasand shared
On Oct 12, 2022
RT @darklordofsys: Without further ado, here is a recording of the magnificent panel that happened at this past weekends @NewYorkerFest with @argvee @runasand @hacks4pancakes @nicoleperlroth https://t.co/5LkIL9NhOY #google #security #informationsecurity #infosec #CyberSecurity #operationaurora
Open
@runasand shared
On Oct 12, 2022
RT @darklordofsys: Without further ado, here is a recording of the magnificent panel that happened at this past weekends @NewYorkerFest with @argvee @runasand @hacks4pancakes @nicoleperlroth https://t.co/5LkIL9NhOY #google #security #informationsecurity #infosec #CyberSecurity #operationaurora
Open
The Zero Trust Strategy

The Zero Trust Strategy

As software and data management systems have evolved, so too have the cybersecurity threats targeting them. How can companies, government agencies, and individuals keep their data secure ...

The SecureMac Interview: Troy Hunt on data breaches

The SecureMac Interview: Troy Hunt on data breaches

Troy Hunt is a Microsoft Regional Director and Microsoft Most Valuable Professional for Developer Security. He is the creator of Have I Been Pwned (HIBP), a free service that aggregates ...

Episode #38 - Nick Shevelyov, Chief Security Officer at Silicon Valley Bank and author of Cyber War and Peace

Episode #38 - Nick Shevelyov, Chief Security Officer at Silicon Valley Bank and author of Cyber War and Peace

Ron Gula interviews Nick Shevelyov of Silicon Valley Bank and author of Cyber War and Peace, about investing in cyber, his experience validating technologies, and helping advise early stage ...

Cybersecurity Shorts — Google’s 2FA Mandate, Peloton’s Leaky API, and Password Management App Malware

Cybersecurity Shorts — Google’s 2FA Mandate, Peloton’s Leaky API, and Password Management App Malware

Cybersecurity Shorts: Google’s 2FA Mandate, Peloton’s Leaky API, and Password Management App Malware.

Q&A: Heather Adkins, director of information security, Google

Q&A: Heather Adkins, director of information security, Google

What follows is the transcript of a Security Conversations podcast interview with Google security leader Heather Adkins.   We discuss her role at the search advertising giant, the ...

David Sanger on the perfect weapon

David Sanger on the perfect weapon

The longtime New York Times national security reporter talks about his new history of cyberwar, why we need a public debate, and how cyberattacks make nuclear war more likely.

Unpacking the New ML Threat Matrix

Unpacking the New ML Threat Matrix

Ram Shankar Siva Kumar and Justin Carroll

Troves of Zoom Credentials Shared on Hacker Forums

Troves of Zoom Credentials Shared on Hacker Forums

Several new databases have been uncovered on underground forums sharing recycled Zoom credentials.

DHS wants legal powers to locate vulnerable systems

DHS wants legal powers to locate vulnerable systems

McAleenan tours cyber lab — Hackers going after vBulletin

5 easy ways to protect yourself from hackers

5 easy ways to protect yourself from hackers

Getting hacked might seem inevitable, but former NSA hacker David Kennedy says there are steps you can take to prevent it from happening.

CrowdStrike co-founder on what's right (and wrong) with US cybersecurity policy

CrowdStrike co-founder on what's right (and wrong) with US cybersecurity policy

Lawmakers every year pass modest legislation intended to improve cybersecurity, and hackers every year ignore it.

The Tim Ferriss Show Transcripts: Vitalik Buterin, Creator of Ethereum, on Understanding Ethereum, ETH vs. BTC, ETH2, Scaling Plans and Timelines, NFTs, Future Considerations, Life Extension, and More (Featuring Naval Ravikant) (#504)

The Tim Ferriss Show Transcripts: Vitalik Buterin, Creator of Ethereum, on Understanding Ethereum, ETH vs. BTC, ETH2, Scaling Plans and Timelines, NFTs, Future Considerations, Life Extension, and More (Featuring Naval Ravikant) (#504)

Please enjoy this transcript of my conversation with Vitalik Buterin and Naval Ravikant. Vitalik Buterin (@VitalikButerin) is the creator of Ethereum. He first discovered blockchain and ...

Hackers Don’t Wear Hoodies with Lisa Plaggemier

Hackers Don’t Wear Hoodies with Lisa Plaggemier

Here to talk about simple security measures you can implement to make it more difficult to be hacked is today’s guest, Lisa Plaggemier.

Raj Samani from Rapid7 on Cybersecurity risks

Raj Samani from Rapid7 on Cybersecurity risks

We know that cybersecurity presents a huge risk to us both personally and professionally, but what can we do to stay safe? To answer this question I spoke with cybersecurity expert Raj ...

Debate: "Should the United States severely restrict Huawei's business?"

Debate: "Should the United States severely restrict Huawei's business?"

Scott Kennedy: Well, good morning. Welcome to CSIS. I’m Scott Kennedy. I’m a senior adviser in the Freeman Chair in China Studies here, and I’m also your safety officer for today. ...