In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone welcome back George Hughey and Rohit Mothe from the Microsoft Security Response Center (MSRC) to discuss their latest blog ...
Terms often used in cybersecurity discussions and education, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at [email protected].
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. This week, we are joined by Kyla Cardona and ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. On Hacking Humans, Dave Bittner, Joe Carrigan, ...
Gianna Whitver is Co-Founder and CEO of the Cybersecurity Marketing Society and Co-Host of the BreakingThrough in Cybersecurity Marketing Podcast. Gianna advises on marketing & GTM for cybersecurity ...
Hackers linked to China and Iran are using AI to enhance cyberattacks. An AI-powered messaging tool for Slack and Discord is reportedly leaking user data. British engineering giant Smiths Group ...
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
Join David Moulton, Director of Thought Leadership at Unit 42, as he explores a real-world malware incident that tested BP’s cybersecurity defenses. Featuring Patrick Wright, Forensics and Incident ...