Humans Are Bad at Risk Assessment, and Other Stories
Risk management is not one of humanity's strong points, but we can learn some lessons from our own real life experiences to apply
He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.
Risk management is not one of humanity's strong points, but we can learn some lessons from our own real life experiences to apply
As software systems have become ever more complex, the opportunity for security researchers to show their value has grown, as
FIN7 is a highly active and capable cybercrime group also known as Carbanak that has been evolving and using its own tools such as
The ENCRPYT Act reintroduced in the House of Representatives last week would prevent states from passing laws to weaken or ban encryption.
The Department of Justice seized two domains used in the Nobelium spear-phishing campaign that impersonated the United States Agency for International Development.
A phishing campaign by the Russian actor known as Nobelium impersonated the United States Agency for International Development while targeting government agencies and humanitarian groups.
Two Chinese cyberespionage groups are targeting flaws in Pulse Secure VPN devices to compromise government and private networks in the U.S. and Europe.
The requirement for vendors to provide a software bill of materials for the apps they sell to federal agencies will only address part of the supply chain risk, experts say.