On Sunday night, March 15, the U.S. Department of Health and Human Services (HHS) was the target of a cyberattack meant to slow its operational response to the ongoing COVID-19 pandemic.
The journey to better cybersecurity begins with understanding what exactly it is that your organization has to fear most and what is perceived as the weakest link in the chain.
In our increasingly hyperconnected and wireless world, tens of millions of internet users’ connections rely on a glass fiber strand no larger than a human hair.
By Dr. Jarrod Sadulski
Learn how gunshot detection technology can help police officers pinpoint the exact location of a shooting so they can respond faster and more accurately.
Hackers use steganography techniques to evade the usual safeguards such as antivirus software and firewalls. A healthy sense of caution is useful.
As an avid follower of information technology trends, I have read hundreds of articles and several dozen books about artificial intelligence (A.I.) over the past six years.
Staying one step ahead of threat actors by assessing the state of network security is definitely not a chore for the faint of heart.
How will the decapitation of Iran’s covert military arm affect its operations? Will it change its targets, its methods of operation (MO), or its capability to operate against American interests in the Middle East and worldwide?