Holly Drake: Non-Traditional Career Paths Are Assets in Cybersecurity

Holly Drake’s career highlights how there isn’t one single path into the field of cybersecurity.

Sudo Vulnerability Discovered, May Exposes Linux Systems

Sudo, the privileged command-line tool often installed on Linux systems, has two local privilege vulnerabilities. 

Increase in Identity-Based Attacks Attributed to Infostealers

Info-stealing malware and advanced phishing kits account for 156% increase in cyberattacks that target user logins.

Security Through Quality: Navigating the Latest Cybersecurity Executive Order

The recent Executive Order from the Trump Administration, while modifying some prior requirements, underscores a crucial truth: agencies still bear the unchanged responsibility of safeguarding mission and data.

Security Leaders Discuss Marco Rubio AI Imposter

Secretary of State Marco Rubio was recently impersonated via text messages and AI voice messages. 

How to Prevent “Smash & Grab” Cyberattacks

The best way to prevent smash & grab cyberattacks is to safeguard shared drives and implement MFA protection in a timely manner.

Threat Actor Targeting Indian Defense Sector

A threat actor based in Pakistan (APT36) has engaged in a sophisticated cyber-espionage campaign.

OT Security Responsibility Is Elevating to Executive Leadership

New research delves into the state of operational technology (OT) cybersecurity. 

Britney Fortner: Relationships Are Key in Security

Britney Fortner believes relationships are valuable in the security field.

Avril Eklund: Building Trust, Teams, and a Better Path Forward

Security leader Avril Eklund takes a look back at her career and role as Director of Security at Microsoft (GitHub).