Humans Are Bad at Risk Assessment, and Other Stories
Risk management is not one of humanity's strong points, but we can learn some lessons from our own real life experiences to apply
He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.
Risk management is not one of humanity's strong points, but we can learn some lessons from our own real life experiences to apply
As software systems have become ever more complex, the opportunity for security researchers to show their value has grown, as
FIN7 is a highly active and capable cybercrime group also known as Carbanak that has been evolving and using its own tools such as
Google, Microsoft and IBM plan to spend billions of dollars in the next five years to aid the Biden administration's move to shore up government and critical infrastructure security.
CISA has released analyses of five new pieces of malware being used in attacks against known bugs in Pulse Connect Secure appliances.
Attackers are stepping up their scanning for Exchange servers vulnerable to the ProxyShell vulnerabilities and installing webshells, ransomware, and other malware.
Jonathan Mayer, assistant professor of computer science at Princeton University, joins Dennis Fisher to discuss the technical and legal challenges of Apple's announced CSAM scanning system.
A critical flaw in the ThroughTek Kalay Io platform could allow an attacker complete access to IP cameras, DVRs, and other devices.