Humans Are Bad at Risk Assessment, and Other Stories
Risk management is not one of humanity's strong points, but we can learn some lessons from our own real life experiences to apply
He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.
Risk management is not one of humanity's strong points, but we can learn some lessons from our own real life experiences to apply
As software systems have become ever more complex, the opportunity for security researchers to show their value has grown, as
FIN7 is a highly active and capable cybercrime group also known as Carbanak that has been evolving and using its own tools such as
The shift to remote work has caused a spike in the number of RDP servers exposed to the Internet, along with an increase in the number of scans for those servers.
Research shows that attackers can bypass fingerprint sensors on some devices with as high as an 80 percent success rate.
An attacker is exploiting open Docker API ports to gain a foothold and install a piece of malware called Kinsing that tries to mine Bitcoin.
Attackers are exploiting two use-after-free bugs in Firefox and Mozilla has released emergency patches for the vulnerabilities.
We've put together a list of security and privacy related book recommendations from people across the industry, from technical manuals to histories to cyberpunk fiction.