Humans Are Bad at Risk Assessment, and Other Stories
Risk management is not one of humanity's strong points, but we can learn some lessons from our own real life experiences to apply
He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.
Risk management is not one of humanity's strong points, but we can learn some lessons from our own real life experiences to apply
As software systems have become ever more complex, the opportunity for security researchers to show their value has grown, as
FIN7 is a highly active and capable cybercrime group also known as Carbanak that has been evolving and using its own tools such as
A flaw in the Bluetooth specification could let a nearby attacker intercept traffic between two paired devices.
Two-factor authentication is a vital part of many corporate security strategies, and is now offered by lots of consumer apps, as well. We wanted to see how much users know about it, so we asked one.
Lawmakers and the federal government are looking for ways to counter influence and disinformation campaigns on social media and the wider Internet.
Major tech companies and some lawmakers are pushing for rules on using facial recognition systems, but federal regulation isn't on the horizon.
Two months into his job, FTC Chairman Joseph Simons says the commission needs more authority to enforce data security privacy violations.