CISA Emergency Directive Orders Mitigations After Microsoft Breach
The U.S. government has made public an emergency directive that it issued last week for federal agencies, ordering them to take
In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.
The U.S. government has made public an emergency directive that it issued last week for federal agencies, ordering them to take
The XZ Utils backdoor was a very subtle operation that took several years to pull off, and while some of the technical details are
CISA has laid out the proposed details of the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA).
In a special bonus Memory Safe episode, Dennis Fisher, Decipher’s editor in chief, talks about his decades of experience writing about cybersecurity news, the article he authored that inspired him to get into the industry (hint: it involved phishing) and how the cybersecurity news world has changed over the years.
UnitedHealth Group's CEO revealed that attackers behind the hack gained initial access by leveraging compromised credentials for a Citrix application that didn’t have multi-factor authentication enabled.
The DHS guidelines outline how critical infrastructure entities can best be secured against the various risks associated with AI.
Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.
New guidelines from the NSA highlight best security practices for deploying and operating AI systems.