From insecure voting machines to social media misinformation, governments have alot to think about when it comes to securing elections.
A kid’s tablet with security vulnerabilities is only the latest privacy faux pas in a children’s connected device.
Gamers are easy pickings for credential crooks, thanks to lax security hygiene and poor gaming company practices.
In this first part of a two part series, Shawn Taylor with Forescout talks to Threatpost about lessons learned from helping Atlanta remediate and recover from its massive ransomware attack.
The Threatpost editors discuss the highlights from Infosecurity Europe, which took place in London this week.
Poor password hygiene continues to plague the security industry, Troy Hunt said during Infosecurity Europe.
The complexity and scale of the 5G ecosystem, combined with a lack of skills and training in software-centric security, will be important drivers for AI deployment in the carrier space.
What does 5G mean from a security vendor perspective? A Palo Alto Networks expert sounds off at GSMA’s Mobile360 this week.
A top UK government cyber-official has called out the telecom supplier, long suspected to use its infrastructure sales as a base for industrial espionage.
HCL domain pages exposed sensitive data – including passwords and project analysis reports – for thousands of employees and customers.