In the second episode of Threat Vector, Kristopher Russo, senior threat researcher at Unit 42, and David Moulton, discuss the threat landscape and take…
defense
-
-
A decade ago, then-Secretary of Defense Leon Panetta uttered a phrase that would go on to live in infamy: “cyber Pearl Harbor.” Panetta was…
-
LinuxNetwork SecurityNewsOperating SystemPC & LaptopServerSoftware
PCI compliance: The best defense is a great defense
Sophisticated criminal syndicates, rogue nation states and a global community of nefarious attackers are all eager to pilfer valuable data, including payment card information.…
-
While ransomware still dominates the threat landscape, recent Sophos research finds attacker dwell time decreased in 2022, from 15 to 10 days, for all attack types. For…
-
LinuxNetwork SecurityNewsOperating SystemPC & LaptopServerSoftware
Generative AI’s potential as a force multiplier in defense
When it comes to safeguarding people and nations, innovation can never rest. That’s why, around the world, governments and the defense industry as a…
-
The last decade has witnessed rapid adoption of machine learning (ML) and artificial intelligence (AI) technologies across various sectors. More recently, the introduction of…