NIST has announced the final public draft Special Publication 800-37, Revision 2, Risk Management Framework for Information Systems and Organizations–A System Life…
Call it alert fatigue. Call it information overload. Call it mind-killing and soul-destroying. The sheer number of alerts coming into…
ESET researchers have discovered a cyberattack that uses a Unified Extensible Firmware Interface (UEFI) rootkit to establish a presence on…
McAfee Researchers Analyse Cryptomining Malware Trend, Windows 10 Cortana Vulnerabilities, Blockchain Attack Vectors, Mobile Billing Fraud Apps, and the Weaponisation…
NIST Requests Public Comments on Draft NISTIR 8228 NIST has released Draft NIST Internal Report (NISTIR) 8228, Considerations for Managing…
The proliferation of wireless and bring your own device (BYOD) endpoints means corporate networks depend more on wireless networks. Securing…
NIST Requests Comments on Draft NISTIR 8221, “A Methodology for Determining Forensic Data Requirements for Detecting Hypervisor Attacks” NIST has…
You wake up feeling toasty warm on a somewhat dreary and rainy day and you start to think about what…
Had you believed the headlines over the last twelve months, some of our most commonly used technologies would now be…
Ken Soh, CEO of Athena Dynamics Pte Ltd speaks about his journey into Intrepreneurship, shipping and maritime security frameworks, SCADA…