News
Despite being adopted and prioritized by many organizations, cybersecurity still faces a significant challenge where leaders still cannot articulate their needs, and find and develop talent. Rather, ...
Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC ...
On this week's show: OpenAI's models are reportedly resisting human commands to shut down. A controversial new research paper questions whether AI systems actually "think" or just create an illusion ...
Most cybersecurity vendors lead with fear, gate their best features, and hide behind complexity. Bitwarden did the opposite and still won. In this episode, Gianna and Maria sit down with Gary ...
Dr. Aleise McGowan, Chief Information Security Officer of BlackGirlsHack and a 20-year cybersecurity veteran, joins Ann on this week's episode of Afternoon Cyber Tea. Aleise shares how a ...
A House oversight committee requests DOGE documents from Microsoft. Predatory Sparrow claims a cyberattack on an Iranian bank. Microsoft says data that happens in Europe will stay in Europe. A complex ...
This week, we are joined by John Hammond, Principal Security Researcher at Huntress, who is sharing his PoC and research on "CVE-2025-30406 - Critical Gladinet CentreStack & Triofox ...
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint ...
Yonatan Zunger, Corporate Vice President and Deputy Chief Information Security Officer for Artificial Intelligence at Microsoft joins Ann on this week's episode of Afternoon Cyber Tea. They dive into ...
We’re back with a special episode recorded at RSAC 2025. The booths are packed up, and the leftover swag is gathering dust, but the real conversations are just getting started. Gianna and Maria sat ...
Researchers discover what may be China’s largest ever data leak. CrowdStrike cooperates with federal authorities following last year’s major software bug. A researcher discovers over half a million ...
Traditionally, a Chief Information Security Officer (CISO) is responsible for overseeing an organization’s various information, cyber, and technology security. While specific duties may change from ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results