Where to Track Cyber Activity Tied to the US-Israel-Iran Conflict
This list -- to be updated regularly -- contains sites that are ideal for those tracking cyber activity surrounding the US-Israel-Iran conflict.
This list -- to be updated regularly -- contains sites that are ideal for those tracking cyber activity surrounding the US-Israel-Iran conflict.
Five cybersecurity thinkers worth following as they explore how AI is transforming security operations, decision-making, and the future of work for defenders.
The escalating conflict with Iran underscores how the once-clear boundary between cyber and kinetic warfare has collapsed, forcing organizations to rethink cybersecurity as inseparable from physical and geopolitical risk.
PR people often get a bad rap for their persistence and occasional aggressiveness. But the truth is that they are the connectors, the builders of long-lasting relationships. These five are among the best in cybersecurity.
Using AI in the editorial process can be weird. But in an educational way -- whether you're a writer, an image designer or a cybersecurity practitioner.
Here are five people who are taking the lead in making critical infrastructure more resilient in the face of nation-state attacks.
Mental health tools for cybersecurity practitioners have become essential in this age of accelerating cyber warfare. Here are five people who are building those tools.
After years of hiatus, my weekly #FollowFriday list is back. There's no better home for it than CYBR.SEC.Media, because we are building a community.
Part of our mission is to be a safe house where cyber travelers can find truth and reason.
Many good individuals, nonprofits, and organizations are trying to address this problem in meaningful ways. But too often, those efforts exist in isolation.
Security challenges aren’t usually about tools—they’re about people, alignment, and the unseen friction that builds when roles, workflows, and reality drift apart.
Connected devices are changing how we work—but they’re also opening invisible gateways for attackers. In this article, Phillip Wylie breaks down how IoT vulnerabilities are being exploited and what organizations can do to close these unseen entry points.
Doing less can deliver more. Scope reduction reduces risk, simplifies compliance, and makes regulated opportunities attainable for any organization willing to focus on what really matters.
Go talk to some VM teams, and you, too, will see what I see.
Security Posture Management (SPM) is transforming how organizations secure data, infrastructure, and applications. Learn how cloud and APIs have evolved from security risks into modern SPM enablers.
The problem is that most security models weren’t designed with agent autonomy in mind.