Terms often used in cybersecurity discussions and education, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at editor@n2k.com.
The CyberWire is an independent voice delivering concise, accessible, and relevant cybersecurity news briefings and cybersecurity podcasts to people all across the globe.
Dave Bittner is a security podcast host and one of the founders at CyberWire. He's a creator, producer, videographer, actor, experimenter, and entrepreneur. He's had a long career in the worlds of ...
In anti-phishing training, the percentage of users tested who took one of the following unsafe actions in response to a simulated phishing email: clicking the embedded link, entering data on a landing ...
Building on the success of our flagship Daily Briefing, each weekday we publish exclusive briefings which cover our five focus areas to keep you informed, current and free to focus on what’s important ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. Operation Endgame expands global takedowns. The U ...
Tenzai emerges from stealth with $75 million in seed funding led by Greylock Partners. Sweet Security raises $75 million, ...
The CyberWire podcasts are our look at what’s happening in cyberspace. They provide clear and concise summaries of the news and offer commentary from industry experts as well as our partners.
Dataminr will acquire ThreatConnect for $290 million.Top stories. Veeam to acquire Securiti AI for $1.7 billion. Dataminr will acquire ThreatConnect for $290 million. Mergers and acquisitions. Seattle ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave ...
In the evolving landscape of cybersecurity, sharing information among institutions is critical to bolster defenses against increasingly sophisticated threats. Cooperation between organizations can ...
In the cloud, every second counts. Attacks move at warp speed; security teams must protect the business without slowing it down. Sysdig stops cloud attacks in real time, instantly detecting changes in ...