More than 100 Republican national security experts on Monday called on GOP congressional leaders to push President Donald Trump to concede the election to President-elect Joe Biden, according to the Washington Post. In a signed letter, the experts urged current GOP officeholders and Trump to prioritize the country's national security interests above politics.
Here is a Q&A that answers questions about spoofing the voter. The answers come from Chris Krebbs, CISA director.
The 2020 election season is a Big Deal as well it should be. The Vote, as foundational parts of the whole, is complicated in practice with history showing us just how complicated it can be. Protecting the process and making sure the Vote is fair, secure, and timely, is vital to American Democracy.
- By Saryu Nayyar
- Oct 28, 2020
Today, data is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Additionally, the ability to protect data and code is limited in conventional computing infrastructure.
Not all internet users are careless about their online security. But many are still victims of cybercriminals and stalkers due to mistakes online.
- By Waqas Baig
- May 18, 2020
With growing number of breaches, there is a huge need for more advanced measures to protect public sector data.
- By Warren Poschman
- May 12, 2020
Endpoints are common targets for ransomware and cryptojacking attackers. Here are the solutions available to address those risks.
- By Ilai Bavati
- May 11, 2020
The Star Wars series provides good examples that we can use as lessons to combat scammers attempting to profit from COVID-19, writes Tyler Reguly.
- By Tyler Reguly
- May 04, 2020
After customers reported fraudulent purchases, Nintendo announced that a credential stuffing campaign led to breaches of thousands of accounts.
- By Haley Samsel
- Apr 27, 2020
Nearly 450 active email addresses and passwords used by WHO staff have been leaked online, and the public has received email scams from people posing as staff.
- By Ralph C. Jensen
- Apr 24, 2020
In order to address vulnerabilities and risks, security teams must enable privileged access management and automate security tools, among other tips.
- By Eddie Segal
- Apr 23, 2020
Nearly 8,000 applicants to a Small Business Administration loan program may have had their data shown to other users filling out the application.
- By Haley Samsel
- Apr 22, 2020
Officials handled an attack that disabled access to state agency databases just a few weeks before the state became the epicenter of the COVID-19 crisis.
- By Haley Samsel
- Apr 20, 2020
The app will make it easier for individuals and public health officials to track the spread of COVID-19, but privacy rights groups are pushing for transparency.
- By Haley Samsel
- Apr 13, 2020
Business email compromise attacks continue to be effective, tricking victims into transferring funds to fraudulent accounts.
- By Haley Samsel
- Apr 09, 2020
How to improve client and employee trust, collaborate across departments and reduce costs through SOCs
- By Gilad David Maayan
- Apr 07, 2020
School districts are increasingly turning to Google for online classroom tools during the coronavirus pandemic, but the company has faced scrutiny for the data it collects on students.
- By Haley Samsel
- Apr 07, 2020
After experiencing an unprecedented growth in users over the course of a month, the video conferencing app is hoping to address complaints of “Zoombombing” and improper data collection.
- By Haley Samsel
- Apr 03, 2020
The spread of “Zoombombing,” or hijacking a meeting room with abusive images or speech, has grown in scope as more Americans turn to teleconferencing for classroom instruction and workplace meetings.
- By Haley Samsel
- Apr 02, 2020
The hack took place through Marriott Bonvoy, the company's loyalty app, and affected up to 5.2 million guests.
- By Haley Samsel
- Apr 01, 2020