We’re Taking a Break and Blasting Off into Orbit July 7, 2024 Hugh Taylor Off Articles and Opinion, Featured, Dear Readers: The Journal of Cyber Policy is taking a break from publication as of...
An Entire Organization Can be Breached Just by Plugging in a Compromised Keyboard says Cyber Security Researcher Prathibha Muraleedhara March 14, 2024 Hugh Taylor Off Articles and Opinion, The advancement of technology has led to an increase in cybercrimes. Hackers employ diverse techniques...
African Outsourcing As a Path to Solving the Global Cybersecurity Talent Shortage February 21, 2024 Hugh Taylor Off Articles and Opinion, Featured, Tabiri Analytics, which offers cybersecurity monitoring services, is pioneering an innovative approach to outsourcing that...
Consumer Demand for Better Mobile App Security and Intensified Regulatory Scrutiny Create Need for Increased Cyber Resilience February 13, 2024 Hugh Taylor Off Articles and Opinion, Guest Posts, By Alan Bavosa, VP of Security Products at Appdome The mobile app economy will continue...
New Study Reveals Top 10 US States at Highest Risk of Cybercrime in 2024 January 2, 2024 Hugh Taylor Off Articles and Opinion, Featured, A new study conducted by mobile and telecommunication experts NetworkBuildz has determined the states most...
Top 10 Vulnerabilities in SAP December 4, 2023 Hugh Taylor Off Articles and Opinion, Guest Posts, By Christoph Nagy, SecurityBridge As we know, SAP (Systems, Applications, and Products in Data Processing) is...
Account compromised? Don’t panic—take these steps instead November 30, 2023 Hugh Taylor Off Articles and Opinion, Guest Posts, By James Allman-Talbot, Head of Incident Response & Threat Intelligence, Quorum Cyber There are...
UK’s NCSC Publishes “The Guidelines for Secure AI System Development” November 28, 2023 Hugh Taylor Off Articles and Opinion, Featured, The UK’s National Cyber Security Centre (NCSC) just published The Guidelines for Secure AI System Development,...
Hacking a Satellite: Harder Than It Looks? October 24, 2023 Hugh Taylor Off Articles and Opinion, Featured, The most recent DEF CON featured a demonstration of satellite hacking. In the Hack-a-Sat contest,...
Even Cybersecurity Experts Get Scammed September 19, 2023 Hugh Taylor Off Articles and Opinion, Guest Posts, By John Wilson Realizing a cybercriminal has used your personal information to attempt fraud...