Weekly newsletter on AI, Application Security & Cybercrime
Your data will stay confidential
Join our 13150 followers
Ransomware and cryptominers of continuously growing complexity remained one of the most expensive cybersecurity problems in 2018.
High-Tech Bridge’s CEO Ilia Kolochenko shares some of the industry trends and major threats companies and individuals will likely face in 2019.
While targeted attacks against voters and the election process are growing in 2018, insecure websites and phishing remain the most frequent attack vectors.
Being a Group Data Protection Officer at VFS GLOBAL and a recognized privacy expert, Barry Cook explores practical enforcement of GDPR in the era of AI.
The compilation of the Top 10 notorious cryptocurrency exchange breaches and cryptocurrency thefts occurred in 2018 (so far).
With the increasing popularity of mobile banking and mobile apps, the risks of mobile hacking are also growing. Here are top 10 of 2018’s most notable mobile breaches and incidents.
The most disastrous web and mobile application security data breaches and security incidents of 2018 (so far).
Addressing Shadow IT, legacy and abandoned applications for a holistic risk management program.
Dr. Maria Bada, Cambridge Cybercrime Centre, explains the intricate nature of global cybercrime, its prevention and prosecution under international and national law.
In the second part, we dive into product deployment and maintenance practice to integrate security into the DevOps process.
In this deeper-dive series, we will more closely examine the practicalities and challenges of each of Gartner’s suggested steps for DevSecOps adoption.
Abandoned, shadow and legacy applications undermine cybersecurity and compliance of the largest global companies despite growing security spending.