Hacking It as a CISO: Advice for Security Leadership A security leader shares tips for adopting a CISO mindset, creating risk management strategies, and "selling infosec" to IT and executives.
Digital Clones Could Cause Problems for Identity Systems Three fundamental technologies -- chatbots, audio fakes, and deepfake videos -- have improved to the point that creating digital, real-time clones of people is merely a matter of integrating the systems.
Researchers Trick Facial-Recognition Systems Goal was to see if computer-generated images that look like one person would get classified as another person.
Kr00k, KRACK, and the Seams in Wi-Fi, IoT Encryption Black Hat talk expands on research that uncovered more weaknesses in Wi-Fi chips allowing for the unauthorized decryption of traffic.
Using 'Data for Good' to Control the Pandemic The tech community should unite to develop and distribute a universal COVID-19 contact-tracing application. Here's why and how.
EU-US Privacy Shield Dissolution: What Happens Next? In a world that isn't private by design, security and liability implications for US-based cloud companies are huge.