News

In a significant step to secure the defense industrial base (DIB), the Department of Defense (DoD) has officially released the long-anticipated Cybersecurity Maturity Model Certification (CMMC) Final ...
Cross-domain solutions (CDS) consist of the secure exchange of information between security domains. This type of solution, which emerged as a technological answer to the need to share data between ...
There’s a lot of noise around compliance. New regulations seem to pop up every year, each promising to fix the ever-growing ...
Driving through the quiet, endless beauty of the Nevada desert, I let the raspy voice of Jim Morrison carry me forward. “The ...
Cybersecurity has emerged as a critical and ongoing battle against a dynamic and pervasive global threat. The landscape is ...
Among the variety of cyber-attacks that we witness happening around us, Zero-day attacks are remarkably insidious in nature.
We live in an era where your next big idea could come from an employee working out of a cafe in Tokyo or on the beach in Bali ...
Phishing isn’t what it used to be. It’s no longer fake emails with bad grammar and sketchy links. With AI, modern phishing ...
The cybersecurity landscape is constantly evolving, and security operations centers (SOCs) are feeling the pressure to stay ...
The term “In the Wild” is broadly used to refer to any activity that has been observed outside of a controlled environment.
Software is the invisible infrastructure of our world, powering everything from critical systems to everyday devices. But its ...
Gary Miliefsky, Publisher, Cyber Defense Magazine Every year, Black Hat showcases not just the latest innovations and ...