Holly Drake: Non-Traditional Career Paths Are Assets in Cybersecurity
Holly Drake’s career highlights how there isn’t one single path into the field of cybersecurity.
Sudo Vulnerability Discovered, May Exposes Linux Systems
Sudo, the privileged command-line tool often installed on Linux systems, has two local privilege vulnerabilities.
Increase in Identity-Based Attacks Attributed to Infostealers
Info-stealing malware and advanced phishing kits account for 156% increase in cyberattacks that target user logins.
Security Through Quality: Navigating the Latest Cybersecurity Executive Order
The recent Executive Order from the Trump Administration, while modifying some prior requirements, underscores a crucial truth: agencies still bear the unchanged responsibility of safeguarding mission and data.
Security Leaders Discuss Marco Rubio AI Imposter
Secretary of State Marco Rubio was recently impersonated via text messages and AI voice messages.
How to Prevent “Smash & Grab” Cyberattacks
The best way to prevent smash & grab cyberattacks is to safeguard shared drives and implement MFA protection in a timely manner.
Threat Actor Targeting Indian Defense Sector
A threat actor based in Pakistan (APT36) has engaged in a sophisticated cyber-espionage campaign.
OT Security Responsibility Is Elevating to Executive Leadership
New research delves into the state of operational technology (OT) cybersecurity.
Britney Fortner: Relationships Are Key in Security
Britney Fortner believes relationships are valuable in the security field.
Avril Eklund: Building Trust, Teams, and a Better Path Forward
Security leader Avril Eklund takes a look back at her career and role as Director of Security at Microsoft (GitHub).
















