The Evolution of Automation in the Command Center

The command center has undergone a remarkable transformation over the past several decades, evolving from stations that primarily monitored burglary alarms into sophisticated hubs of security intelligence.

Millions of Printers Exposed to Hacking Due to New Vulnerabilities

Research reveals 8 new vulnerabilities among multifunction printers. 

Trump Administration Reaches for States’ Data

The Trump Administration is moving to collect data retained by the states, leading some privacy experts to express concern. 

A New Way to Think About Metrics in Security Operations

As the security field evolves, so too must the approach to metrics.

WhatsApp Banned on US House of Representatives Devices

WhatsApp is banned from U.S. House of Representatives devices.

FDA Urges Secure Cyber Practices for Medical Product Manufacturing

The FDA highlights the importance of embedding cybersecurity into medical product manufacturing. 

4 Ways to Protect Networks from Botnets Before It’s Too Late

Attackers increasingly rely on botnet malware to accomplish their objectives. 

Cybersecurity in Retail Amidst Escalating Attacks

Myke Lyons, CISO at Cribl, discusses cybersecurity in retail, especially in relation to the recent string of attacks against the sector.

$90M Removed From Iran’s Largest Cryptocurrency Exchange in Cyberattack

Hackers have reportedly stolen funds from Nobitex, Iran’s largest cryptocurrency exchange. 

Quantum Computing: A Call to Action for Security Professionals

There are significant security challenges and opportunities ahead in the era of quantum computing.

You Missed

Do Not Make Yourself Available for Nefarious Activities, Plateau NSCDC Boss, Ishaku Musa, Advises Youths
Egbetokun Upgrades Police Legal Section to Directorate, Appoints Pioneer Director
Anambra Police Nab 63-Year-Old Alleged Leader of Inter-State Child Trafficking Network
URGENT NEED TO ENGAGE MORE MINING MARSHALS IN NIGERIA: A NATIONAL IMPERATIVE