#cybersecurity

[ follow ]
Privacy technologies
fromTechCrunch
7 hours ago

Italian prosecutors confirm journalist was hacked with Paragon spyware | TechCrunch

Italian authorities confirmed that journalist Francesco Cancellato and two activists were infected with Paragon spyware on December 14, 2024, though the source of Cancellato's infection remains unknown.
Information security
fromMail Online
7 hours ago

Iran targets critical US infrastructure as Middle East war spirals

Iran-linked APT group Seedworm infiltrated US critical infrastructure including banks, airports, and defense contractors, installing backdoors for persistent access and potential future attacks.
Information security
fromZDNET
9 hours ago

The average tax scam victim loses $1,020 - and they're younger than you'd think

Tax scams are increasingly sophisticated and widespread, with 82% of Americans concerned about tax fraud, 23% having fallen victim, and average losses reaching $1,020.
Tech industry
fromFortune
10 hours ago

Tech billionaire Shlomo Kramer: the cyber selloff proved that Wall Street can't price tech anymore | Fortune

Market overreaction to Anthropic's Claude Code Security release revealed that investors treat AI and cybersecurity as interchangeable despite their distinct architectures, buyers, and economics.
#quantum-computing
fromenglish.elpais.com
11 hours ago
Information security

John Martinis, winner of 2025 Nobel Prize in Physics: I wouldn't want quantum computing to be known for breaking the internet'

Quantum computers will break current encryption within this decade, requiring immediate transition to quantum-safe cryptography to protect digital infrastructure and global economy.
fromFast Company
2 weeks ago
Information security

Why should you care about quantum computing?

Organizations must urgently adopt quantum-resistant cryptography to prevent future decryption of currently harvested encrypted data.
Information security
fromenglish.elpais.com
11 hours ago

John Martinis, winner of 2025 Nobel Prize in Physics: I wouldn't want quantum computing to be known for breaking the internet'

Quantum computers will break current encryption within this decade, requiring immediate transition to quantum-safe cryptography to protect digital infrastructure and global economy.
US news
fromwww.mercurynews.com
11 hours ago

Larry Magid: Beware of online scams

Americans lost at least $16.6 billion to scams in 2024, with older adults disproportionately targeted through phishing and romance scams that exploit trust and technological unfamiliarity.
Venture
fromBusiness Insider
13 hours ago

The billionaire founder of Palo Alto Networks started a new cybersecurity company.

Nir Zuk founded Cylake, an on-premises AI-powered security system for regulated organizations unable to move data to the cloud, backed by $45 million from Greylock.
Privacy technologies
fromThe Verge
14 hours ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
Privacy professionals
fromwww.bbc.com
1 day ago

We have more privacy controls yet less privacy than ever

Young people increasingly view online privacy as inevitable loss rather than a right, accepting data sharing as currency for digital services while older privacy advocates warn this threatens fundamental freedoms.
#data-breach
Privacy technologies
fromDataBreaches.Net
5 days ago

Leaked Odido data exposes sensitive information - DataBreaches.Net

Dutch news outlets freely reported on the Odido telecom breach affecting 6.2 million customers, exposing sensitive data including stalking victims' information and protected addresses without censorship.
Canada news
fromSecurityWeek
5 days ago

Canadian Tire Data Breach Impacts 38 Million Accounts

A October 2025 data breach at Canadian Tire affected over 38 million accounts, compromising names, emails, dates of birth, encrypted passwords, and partial credit card information across multiple retail brands.
Privacy professionals
fromSecurityWeek
1 day ago

New LexisNexis Data Breach Confirmed After Hackers Leak Files

LexisNexis confirmed a data breach involving legacy data from before 2020, with hackers exfiltrating over 2GB of data through React2Shell vulnerability exploitation and improperly secured AWS instances.
Privacy professionals
fromTheregister
1 day ago

LexisNexis Legal & Professional confirms data breach

LexisNexis Legal & Professional division experienced a data breach affecting legacy servers, with Fulcrumsec claiming responsibility for exploiting a vulnerable React container to access approximately 2 GB of data.
Privacy professionals
fromTheregister
2 days ago

Brit games studio Cloud Imperium admits to data breach

Cloud Imperium Games delayed disclosure of a January 21st data breach affecting user personal data, announcing it only through a subtle popup without proactive communication to affected users.
Privacy professionals
fromTechzine Global
3 days ago

All data from dutch Telco Odido hack now online

ShinyHunters released all stolen data from Odido's 6.5 million customers and 600,000 companies online after the company refused ransom payment, exposing names, addresses, social security numbers, ID documents, and sensitive personal information.
fromSecurityWeek
1 day ago

Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively

I got a rush from feeling challenged. The computer would say 'No', and I would think, 'Well, we'll see'. In his own words it was more a case of Rage Against the Machine than simply Stayin' Alive.
Digital life
Business
from24/7 Wall St.
1 day ago

CrowdStrike Holds Steady on Wednesday While GitLab Plunges 9% After Earnings

CrowdStrike delivered strong earnings with positive GAAP net income and 24% ARR growth, stabilizing its stock, while GitLab disappointed investors with weaker results.
Information security
fromSecurityWeek
1 day ago

How Pirated Software Turns Helpful Employees Into Malware Delivery Agents

Free pirated software often contains malware that can compromise corporate security, steal credentials, and enable ransomware attacks on company endpoints.
fromSecurityWeek
1 day ago

Global Coalition Publishes 6G Security and Resilience Principles

The security and resilience of 6G networks are critical aspects of that wider picture. 6G networks - both public and private - will come to play a vital role in the everyday life of people around the world, with much of our lives reliant on their efficient and secure operation.
Information security
Information security
fromTechzine Global
1 day ago

Eurofiber and Colt want quantum-secure connections

Eurofiber and Colt Technology Services launched a quantum-secure fiber optic connection between Amsterdam, London, and Brussels to protect financial institutions from future quantum computer-based cyberattacks.
fromSecuritymagazine
3 days ago

Brian Harrell - Top Cybersecurity Leaders 2026

Geopolitical and cyber convergence is real. Geopolitical developments will very likely influence the cyber threat landscape in 2026 and beyond. We can't just monitor our own systems and stay compliant with the latest compliance standards. This can have significant impact to you, your supply chain, and your interdependencies. Security is local but it's also worldwide.
Information security
Information security
fromwww.bbc.com
2 days ago

Deepfake attack: 'Many people could have been cheated'

Deepfake technology has increased 3,000% over two years, enabling fraudsters to impersonate executives and manipulate financial markets and corporate security through AI-generated videos and audio.
Privacy professionals
fromDataBreaches.Net
3 days ago

Hacktivists claim to have hacked Homeland Security to release ICE contract data - DataBreaches.Net

Hacktivists claiming to be 'Department of Peace' breached DHS and leaked contracts between the agency, ICE, and over 6,000 companies including defense and tech firms.
#ai-security
fromZDNET
3 days ago
Miscellaneous

Will AI make cybersecurity obsolete or is Silicon Valley confabulating again?

fromFortune
1 week ago
Information security

Nearly two-thirds of companies have lost track of their data just as they're letting AI in through the front door to wander around | Fortune

fromZDNET
3 days ago
Miscellaneous

Will AI make cybersecurity obsolete or is Silicon Valley confabulating again?

fromFortune
1 week ago
Information security

Nearly two-thirds of companies have lost track of their data just as they're letting AI in through the front door to wander around | Fortune

Information security
fromTheregister
3 days ago

Businesses told to harden defenses amid Iran conflict risk

The UK's NCSC warns organizations of potential cyber threats from Middle East conflict escalation, with indirect threats almost certain for region-linked businesses.
#startup-funding
fromSecurityWeek
3 days ago

Madison Square Garden Data Breach Confirmed Months After Hacker Attack

In the Oracle EBS hacking campaign, the Cl0p ransomware and extortion group exploited zero-day vulnerabilities to gain access to data stored by more than 100 organizations in the enterprise management software. Madison Square Garden (MSG), the world-famous arena located in New York City, was named by the hackers as a victim of the campaign in November 2025.
Privacy professionals
Information security
fromPsychology Today
1 week ago

The Importance of Media Psychology in Cybersecurity

Cybersecurity breaches exploit human psychological vulnerabilities through media psychology principles including persuasion, attention manipulation, and cognitive biases.
fromZDNET
1 week ago

Why scammers call you and say nothing - and how to respond safely

Calls where no one responds are rarely accidental. In many cases, they are automated reconnaissance events. Fraud operations run at industrial scale, and before they invest human effort in a target, they validate that a number is active and answered by a real person.
Information security
Information security
fromSecurityWeek
1 week ago

Trend Micro Patches Critical Apex One Vulnerabilities

TrendAI released patches for eight vulnerabilities in Apex One endpoint security, including two critical flaws allowing remote code execution on the management console.
fromTechCrunch
1 week ago

Inside the story of the US defense contractor who leaked hacking tools to Russia | TechCrunch

Peter Williams, a former executive at U.S. defense contractor L3Harris, was sentenced on Tuesday to 87 months in prison for leaking his former company's trade secrets in exchange for $1.3 million in crypto between 2022 and 2025. Williams sold the exploits to Operation Zero, which the U.S. government calls 'one of the world's most nefarious exploit brokers.'
Information security
Information security
from24/7 Wall St.
1 week ago

Fortinet Is Down 28% YTD, But Its Free Cash Flow Just Hit a Record $2.21 Billion

Fortinet demonstrates strong financial fundamentals with record free cash flow of $2.21 billion and 16% billings growth, while Sovereign SASE technology positions the company for significant market expansion despite recent stock decline.
#agentic-ai
fromNieman Lab
1 week ago

Why "magic links" and passcodes are taking over news logins

Passwords get hacked all the time, but they can't be hacked if they don't exist...this allows a small team like 404 to spend less time managing security administration, and more time investing in bringing you stories you care about.
Privacy technologies
from24/7 Wall St.
1 week ago

PANW Is Down 19% But Its AI Security Bet May Change That

Headline numbers were solid: revenue grew 15% year-over-year to $2.59 billion, adjusted EPS of $1.03 beat expectations, and next-generation security ARR jumped 33% to $6.33 billion. But management trimmed its full-year profit outlook due to acquisition costs, and Q3 EPS guidance missed expectations, sending shares down 5-7% in after-hours trading.
Information security
Information security
fromThe Hacker News
1 week ago

Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker

An L3Harris defense contractor employee sold eight zero-day exploits to Russian broker Operation Zero for millions in cryptocurrency, receiving a seven-year prison sentence for theft of trade secrets.
fromFuturism
1 week ago

AI Is Destroying Grocery Supply Chains

Whole Foods shelves sit empty after a data breach shut down its wholesale distributor. Meat packers working for JBS Foods are paralyzed as an $11 million ransomware attack takes out their processing facilities. Some 2.2 million workers at Stop & Shop and Hannaford have their personal data exposed as the result of a cyberattack on parent company Ahold Delhaize USA. These scenarios, straight from a William Gibson novel, are becoming increasingly common in supply chains across the world.
Food & drink
Information security
fromDataBreaches.Net
1 week ago

This is how you do it: Dentist speaks out after practice hit by cyber attack - DataBreaches.Net

A dental practice's computer system was hacked, sending fraudulent invoice emails; the breach was quickly detected, halted by IT, and appears to have originated overseas.
Information security
fromSecurityWeek
1 week ago

Chip Testing Giant Advantest Hit by Ransomware

Advantest detected a February 15 ransomware intrusion that may have affected parts of its network; investigation is ongoing and potential data impact is under review.
US politics
fromTheregister
2 weeks ago

GAO urges NSF CIO to fix cloud SLAs, tighten IT oversight

NSF must improve IT planning, cloud procurement and SLAs, complete annual IT portfolio reviews, overhaul cloud contracts, and address open cybersecurity recommendations.
#tp-link
Artificial intelligence
fromFortune
2 weeks ago

'I'm deeply uncomfortable': Anthropic CEO warns that a cadre of AI leaders, including himself, should not be in charge of the technology's future | Fortune

Anthropic's CEO advocates stronger AI regulation, transparency, and broader oversight rather than leaving safety decisions to a few tech leaders.
fromBusiness Matters
2 weeks ago

The Digital Balancing Act: How Growing Businesses Can Move Faster Without Sacrificing Security

Because of this massive shift, the pressure on business owners has never been higher. Consumers today have zero patience. If your mobile application is slow, or if your website lacks the features they want, they will instantly move to a competitor. To survive and grow, a modern business must be able to create and update its digital tools incredibly fast. However, rushing to build technology introduces a terrible risk: you might accidentally leave your digital doors wide open to criminals.
Software development
Information security
fromFast Company
2 weeks ago

Google's threat intel chief explains why AI is now both the weapon and the target

Generative AI systems are becoming core infrastructure and simultaneously increasing cyber risk as models become high-value targets susceptible to model-extraction and AI-enabled attacks.
Information security
fromDataBreaches.Net
2 weeks ago

Data Protection Failures on Moldovan Portals Leave Citizens at Risk - DataBreaches.Net

Moldova's government job portal exposed thousands of applicants' personal records for years through an unauthenticated, URL-indexed repository requiring only simple URL manipulation.
#ddos-attack
fromNextgov.com
2 weeks ago

FAA launches competition to modernize aging IT portfolio

In an effort to transform this portfolio, the agency is launching a challenge to gather ideas from industry on how to move these old systems to cloud-native architectures and reduce its technical debt. According to a Tuesday notice on Sam.gov, the agency is forgoing a traditional acquisition in favor of a challenge-based approach. The multi-phase competition will allow the FAA to watch vendors perform, not just pitch.
Science
fromTechRepublic
2 weeks ago

Substack Breach May Have Leaked Nearly 700,000 User Details Online

On February 3rd, we identified evidence of a problem with our systems that allowed an unauthorized third party to access limited user data without permission, including email addresses, phone numbers, and other internal metadata,
Information security
Information security
from24/7 Wall St.
2 weeks ago

Why Palo Alto Networks (PANW) Is Really Down 6.5% This Morning

Palo Alto Networks reported solid Q2 results, but weak Q3 profit guidance and acquisition-related integration costs triggered a sharp share price decline.
fromTheregister
2 weeks ago

German train line back on track after DDoS yanks the brakes

"Deutsche Bahn has been and continues to be subject to attacks on its IT systems," the company said in an update posted hours after the initial service restoration. "The current attack is specifically targeted at DB and has occurred in waves. "The scale of the attack is considerable. Our defense mechanisms are working. We will not comment on speculation regarding the background of the attack."
Germany news
Information security
fromThe Local Germany
2 weeks ago

Deutsche Bahn's app and website hit by 'considerable' cyberattack

A sustained DDoS cyberattack is disrupting Deutsche Bahn's ticketing systems and timetable services, intermittently affecting bookings and customer access.
fromAol
2 weeks ago

10 Work-From-Home Jobs That Pay at Least $110,000 a Year

Data scientists pore over data to tease out key insights. For example, they may gather data from a survey or by scraping the internet. They then develop algorithms and models to analyze data, helping their organizations craft effective business strategies. A bachelor's degree in mathematics, statistics or computer science is often required for this role. As with many tech jobs, data scientists can work from almost anywhere, including home.
Careers
Information security
fromTechzine Global
2 weeks ago

Palo Alto lowers profit forecast after CyberArk deal

Palo Alto Networks has acquired multiple security firms and is integrating them, increasing costs and lowering profit guidance despite higher revenue forecasts.
Information security
fromThe Hacker News
2 weeks ago

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability

Cybersecurity must be structural reinforcement ensuring operational continuity, visibility, and controlled adaptation amid continuous AI-driven threats, regulatory constraints, and geopolitical pressure.
Miscellaneous
fromLondon Business News | Londonlovesbusiness.com
2 weeks ago

UK security services are hunting Russian agents on home soil - London Business News | Londonlovesbusiness.com

Britain's intelligence agencies actively dismantle Russian spy networks, intercept communications, disrupt cyberattacks, expel operatives, and protect dissidents through coordinated counterintelligence operations.
#ai
fromZDNET
2 weeks ago
Artificial intelligence

What Aristotle and Socrates can teach us about using generative AI

fromZDNET
2 weeks ago
Artificial intelligence

What Aristotle and Socrates can teach us about using generative AI

Artificial intelligence
fromWIRED
2 weeks ago

Meta and Other Tech Companies Ban OpenClaw Over Cybersecurity Concerns

Companies are restricting or banning OpenClaw because it can autonomously control computers, behave unpredictably, and create privacy and security risks.
UK news
fromComputerWeekly.com
2 weeks ago

Businesses may be caught by government proposals to restrict VPN use | Computer Weekly

Limiting VPN use to under-16s risks disrupting legitimate business operations and weakening privacy and cybersecurity protections without clear carve-outs or implementation details.
Information security
fromBusiness Matters
2 weeks ago

Security Convergence and The Human Error

Human error causes the majority of data breaches, driven by skill- and decision-based mistakes, employee negligence, and basic security vulnerabilities like weak passwords.
fromDataBreaches.Net
2 weeks ago

Montana hospital restores phones as cyber-related network disruptions persist - DataBreaches.Net

Livingston HealthCare in Livingston, Montana, says its phone system has been restored after a cybersecurity incident disrupted communications and led the hospital to take some systems offline, but network disruptions continue as restoration work proceeds. The nonprofit hospital said Feb. 13 that a "potential cybersecurity incident" disrupted its phone systems and network and that it temporarily took certain systems offline "out of an abundance of caution" while it assessed the situation and worked with outside experts.
Healthcare
EU data protection
fromThe Hacker News
2 weeks ago

Safe and Inclusive ESociety: How Lithuania Is Bracing for AIDriven Cyber Fraud

Lithuania strengthens cyber resilience through a government-funded initiative coordinating universities and companies to deploy secure, market-ready digital solutions protecting citizens and critical infrastructure.
fromSecuritymagazine
2 weeks ago

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Organizations traditionally approach security risk through a narrow lens, often equating "security" primarily with cybersecurity. While cybersecurity is critically important, it represents only one subset of a much broader security landscape. Cybersecurity focuses on the protection of technologies that collect, store, process and transmit data. By contrast, security-related risk encompasses all forms of loss arising from the failure to protect organizational assets.
Information security
Privacy professionals
fromDataBreaches.Net
2 weeks ago

Nevada unveils new statewide data classification policy months after cyberattack - DataBreaches.Net

Nevada implemented a four-tier data classification policy requiring agencies to categorize data as public, sensitive, confidential, or restricted, defaulting to the stricter classification if unclear.
fromTNW | Eu
2 weeks ago

Munich 2026: A security conference where tech isn't an afterthought

The 62nd Munich Security Conference opened on 13 February 2026 in Munich, Germany, and this year's gathering feels different from past editions. For decades, Munich was about jets, troops, and treaties. Today, cyber and AI are no longer peripheral; they are part of the architecture of security itself. Cyber risks, digital infrastructure, and emerging technologies like AI now sit alongside tanks and treaties on the agenda as European leaders try to make sense of a world where digital threats and geopolitical tensions are deeply intertwined.
Miscellaneous
fromNextgov.com
2 weeks ago

CISA to furlough most of its workforce under impending DHS shutdown

A likely partial government shutdown after Friday would impair the Cybersecurity and Infrastructure Security Agency's operations, leading to diminished capabilities in critical areas including cyber response, security assessments, stakeholder engagements, training exercises and special event planning, a top official said this week. CISA would furlough a majority of its workforce and just one-third would remain on the job under shutdown conditions, agency acting director Madhu Gottumukkala told House appropriators on Wednesday.
US politics
Software development
fromwww.bbc.com
3 weeks ago

AI coding platform's flaws allow BBC reporter to be hacked

Orchids, a popular AI coding platform, has a significant unpatched vulnerability that allowed remote code modification and access to users' computers.
fromTheregister
3 weeks ago

Google: China's APT31 used Gemini to plan US cyberattacks

A Chinese government hacking group that has been sanctioned for targeting America's critical infrastructure used Google's AI chatbot, Gemini, to auto-analyze vulnerabilities and plan cyberattacks against US organizations, the company says. While there's no indication that any of these attacks were successful, "APT groups like this continue to experiment with adopting AI to support semi-autonomous offensive operations," Google Threat Intelligence Group chief analyst John Hultquist told The Register. "We anticipate that China-based actors in particular will continue to build agentic approaches for cyber offensive scale."
Information security
Information security
fromSecurityWeek
3 weeks ago

Nevada Unveils New Statewide Data Classification Policy Months After Cyberattack

Nevada implemented a four-tier data classification policy—public, sensitive, confidential, restricted—to standardize state data privacy and assign agencies responsibility for classification and compliance.
Information security
fromTechCrunch
3 weeks ago

DOJ says Trenchant boss sold exploits to Russian broker capable of accessing 'millions of computers and devices' | TechCrunch

A former Trenchant executive stole and sold eight hacking tools enabling potential global surveillance and cyberattacks, pleaded guilty, and faces prison, fines, and restitution.
Information security
from24/7 Wall St.
3 weeks ago

Surviving the SaaS-pocalypse: JPMorgan's 3 Top Cyber Stocks Ready to Surge

AI-enabled plug-ins triggered a near-$1 trillion SaaS sell-off before fears eased, while CrowdStrike’s AI-native Falcon platform positions it for sustained growth.
fromDigiday
3 weeks ago

In Graphic Detail: AI licensing deals, protection measures aren't slowing web scraping

New data is reinforcing a structural shift in how AI systems access publisher content: AI models are increasingly scraping publisher content, regardless of bot-blocking measures or content licensing deals meant to control usage, improve attribution or drive referral traffic. New research from analytics firms and bot-tracking companies shows AI tools are increasingly crawling publisher sites as inputs for AI-generated summaries and training, while sending back only limited referral traffic.
Artificial intelligence
World news
fromThe Hacker News
3 weeks ago

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

North Korean operatives use stolen LinkedIn identities and verified workplace credentials to secure remote jobs for espionage, revenue generation, and data theft.
Venture
fromSecurityWeek
3 weeks ago

Vega Raises $120M in Series B Funding to Grow Security Analytics Platform

Vega raised $120 million Series B (total $185M), offering an AI-driven alternative to SIEM that reduces data centralization and secures large enterprise contracts.
Artificial intelligence
fromHarvard Gazette
3 weeks ago

Worried about how AI may affect foreign policy? You should be. - Harvard Gazette

Governments adopting AI face significant cybersecurity vulnerabilities and require oversight, regulation, and international cooperation to balance benefits and prevent misuse.
UK news
fromwww.independent.co.uk
3 weeks ago

Afghan data breach was wake-up call' for government's data security

Government data handling changed significantly after an Afghan breach exposed thousands' details, and a national news outlet stresses free, on-the-ground journalism funded by donations.
Information security
fromSecurityWeek
3 weeks ago

RSAC Releases Quantickle Open Source Threat Intelligence Visualization Tool

Quantickle is an open-source, browser-based network graph visualization tool for manual threat analysis, offering customizable visualizations, imports/exports, and REST API integrations.
Business
fromBusiness Insider
3 weeks ago

Salesforce is replacing 5 high-profile leaders who have left since December with 6 new execs

Salesforce appointed six new leaders and promoted internal executives to fill departing roles, reallocating responsibilities across security, marketing, architecture, Slack, and AI services.
Information security
fromComputerWeekly.com
3 weeks ago

Russia's cyber attacks on Polish utilities draws NCSC alert | Computer Weekly

Russian state cyber actors attacked Poland's electricity grid, prompting NCSC to warn UK utilities to strengthen cyber defenses and resilience.
Information security
fromSecurityWeek
3 weeks ago

Outtake Raises $40 Million to Bolster Digital Trust Against AI-Driven Threats

Outtake raised $40M to build a unified, agentic-AI platform for maintaining digital trust and defending against AI-driven phishing, impersonation, and other modern threats.
Information security
fromBusiness Insider
3 weeks ago

Lema, founded by former members of Israel's elite 8200 intelligence unit, is coming out of stealth

Lema focuses on reducing third-party vendor risk to company systems and raised a $24 million Series A led by Team8.
Information security
fromThe Cipher Brief
3 weeks ago

The Former Head of NSA on the Future of U.S. Cybersecurity

General Nakasone continues leading cybersecurity initiatives at Vanderbilt, advises tech companies, and stresses persistent engagement and election security to prevent foreign influence.
Information security
fromSecuritymagazine
3 weeks ago

Product Spotlight on Analytics

Taelor Sutherland is Associate Editor at Security magazine covering enterprise security, coordinating digital content, and holding a BA in English Literature from Agnes Scott College.
[ Load more ]