I’ve spoken with plenty of cybersecurity leaders in my time, but hosting Jen Easterly at Pentera’s National Xposure 2025 summit felt different. As a f...
The evolution of software always catches us by surprise. I remember betting against the IBM computer Deep Blue during its chess match against the gran...
Would you believe that 49% of all data breaches involve passwords? The Verizon Data Breach Investigations Report highlights that stolen or weak passwo...
Ransomware is a topic that regularly comes up when I speak to CISOs and information security leaders, understandably so as recent reports have highl...
There is no precedence to the unconscionable way hackers exploit human distress during these times. Albeit a few hacker groups “swore” on paper they...