An Iranian flag is carried around the Azadi (Freedom) monument tower during the annual rally commemorating Iran’s 1979 Islamic Revolution in Tehran on Feb. 11, 2024. (Photo by Majid Saeedi/Getty Images)
Members of a notorious Iranian hacking crew are using false personas to steal credentials and access victim cloud environments, per a new Mandiant report.
Joyce touches on what’s keeping CISOs up at night, how generative AI is impacting the cybersecurity industry, the evolving cyber threat landscape, and the need for more…
From left, Mandiant’s Jurgen Kutscher, Kevin Mandia and Sandra Joyce participate in a panel discussion at the Google Cloud’s Next technology conference in Las Vegas on April 9, 2024. (Scoop News Group photo)
A cosplayer dressed as the Star Wars character Darth Vader holds a mobile phone displaying a government alert issued to all smartphones to test a system used to warn of life-threatening emergencies at the Scarborough Sci-Fi Convention in Scarborough north-east England on April 23, 2023. (Photo by OLI SCARFF/AFP via Getty Images)
People form a peace sign with candles ahead of a rally marking the eve of the second anniversary of Russia’s invasion of Ukraine, in front of the Reichstag, the building housing the Bundestag (German lower house of parliament) in Berlin on Feb. 23, 2024. (Photo by ODD ANDERSEN/AFP via Getty Images)
This picture taken from Rafah shows smoke billowing following Israeli bombardments over Khan Yunis in the southern Gaza Strip on February 13, 2024, amid the ongoing conflict between Israel and the Palestinian Hamas militant group. (Photo by SAID KHATIB / AFP)
Government and industry leaders share their thoughts on AI, supply chain security, open-source technology, and the greatest security risks to look out for.
Bushar shares that Google has worked to build the SLSA framework, allowing organizations to grade their supply-chain maturity and ensure the security lifecycle during modernization.