The acquisition of Assetnote enables Searchlight Cyber to provide more proactive cyber risk detection. By integrating ...
On the cyber front, there were sustained levels of cyberattacks, including ransomware and denial-of-service attacks directed at state and local government information systems. In the world of ...
A new security report from the company states that threat actors haven't been able to use AI to develop novel capabilities to accelerate and amplify attacks.
Seven years after a cyber attack cost her North Carolina school district $1.3 million, a retired CTO shared stories and tips from the 42-day recovery process at the Future of Education Technology ...
AttackIQ®, the leading vendor of Adversarial Exposure Validation (AEV) solutions and founding research partner of the MITRE Center for Threat-Informed Defense (CTID), today announced the acquisition ...
While attack methods such as phishing and ransomware continue to plague the healthcare industry, artificial intelligence is ...
One day last summer, a Russia-affiliated crime syndicate kneecapped the city of Columbus, Ohio, without lifting a hammer. It ...
Cyber Defense Media Group is proud to announce that its CEO and renowned cybersecurity expert, Gary Miliefsky, has filed a patent for a revolutionary system: the AI-Driven Cyber Defense Real-Time ...
I've seen many evolutions of threats in my years as a cybersecurity CEO, but nothing compares to the danger emerging right ...
Fall was a busy conference season for Tidal Cyber. My colleagues and I participated in events including Black Hat, FutureCon, Health-ISAC, FS-ISAC, ATT&CKCon, and numerous regional Cybersecurity ...
Hackers can exploit a flaw in Apple CPUs to steal your private data through your browser. Find out how this attack works and ...