Active Cyber Defense Strategy Could Use Private Sector AI-based Bounty Hunters to Protect Critical Infrastructure
Concerned about the ability of rogue actors and malignant nation-states to take down the power grid and disrupt the critical financial, transportation, and telecommunications infrastructure of the nation, top U.S. defense strategists are now proposing a strategy of...
Russian Hackers Claim to Have Breached Major Anti-Malware Vendors; How Big Is the Threat?
A group of skilled Russian hackers with a history of infiltrating high-profile targets claim to have stolen the source code used by three major anti-malware vendors based in the United States. Much about this story has yet to be verified, but if true it could force...
Monster-Sized Breaches Are Disasters for Your Enterprise
Regardless of the industries in which they operate, most organizations handle some type of sensitive data, like PII (personally identifiable information). If this information is not protected correctly, the resulting breaches can harm innocent people and, in many...
You Aren’t Paying Attention If You Aren’t Scared of Ransomware
What do the City of Atlanta and Baltimore, Hancock Health, the Chicago Police Department, Boeing, and Finger Lakes Health all have in common? Ransomware. These extortion style attacks target small and large businesses, from government to healthcare and everything in...







