Defcon 1 is a wargame that simulates the nuclear threat from the Cold War. Players control asymmetrical blocs and compete to build nuclear weapons; rewards can be earned for completing…
Businesses must remain prepared for all possible threats to their organization – such as terrorist attacks and geopolitical unrest – which necessitate being well informed of Intelligence to make critical…
Adaptive Trust goes beyond simply monitoring people, to encompass devices, apps, data and resources which a person attempts to access. It recognizes patterns and analyzes anomalies before automatically taking steps…
Casey Fleming is widely recognized as an influential thought leader, expert, and keynote speaker. As chairman and CEO of BLACKOPS Partners Corporation – a premier intelligence, cybersecurity, asymmetrical hybrid warfare…
Western movies feature good guys wearing white hats while bad guys wear black ones; Tim Berners-Lee is known as one such white-hat hacker and helped create the World Wide Web….
With more industrial systems becoming connected to the internet, hacker groups are increasingly interested in penetrating these networks for breaches and inspection. Many state-sponsored groups such as Electrum (also known…
Piracy refers to any illegal copying and distribution of digital content such as music or software without authorized distribution channels, and poses significant threats for computer users. Piracy deprives music,…
Cyber Security Magazine equips technology professionals and consumers to be smart providers and consumers of secure systems, while helping researchers understand the practical challenges associated with their research projects. Cybersecurity…
Security professionals often cite cybersecurity acronyms to convey messages. But that shouldn’t stop anyone from learning them! Integrating vulnerability testing into your continuous integration and continuous deployment pipeline is one…
Cybersecurity refers to the practice of safeguarding computers, networks and devices against any potential danger. It can be seen as the digital equivalent of physical security – protecting buildings from…