
In this interview, we discuss how Data Mining techniques and machine learning algorithms can be extremely useful when applied in covert channel detection and…


Just like the old-fashioned pickpockets and scalpers we’ve learned to avoid, cyber scammers are exploiting major world events to target…


52% of businesses surveyed report loss of customer trust as the top consequence that would result from a breach Two…



NIST announces the release of Draft NISTIR 8214, Threshold Schemes for Cryptographic Primitives: Challenges and Opportunities in Standardization and Validation…


Former FireEye and McAfee CEO Invests in JASK Series B Through NightDragon Security, Joins Company’s Board to Facilitate Leadership and…


More than 90 percent of global organisations reported the volume of phishing attacks have increased or stayed the same in…


Increasing complexity within the monitoring and control core infrastructures of Australia’s utility operators may make them more susceptible to cyber…


SonicWall NGFW earns 98.8 percent security effectiveness rating and low TCO with $4 cost per protected Mbps Tested 100 percent…



This podcast interview with Deepak Nanda, President of the LA Venture Fund, not just delves into venture capital criteria for…



NIST is updating its guidance for transitioning to the use of stronger cryptographic keys and more robust algorithms by federal…