Memory Safe: Merritt Baer
Merritt Baer, field CISO at Lacework and former member of the AWS office of the CISO, joins Lindsey O'Donnel-Welch in this...
In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.
Merritt Baer, field CISO at Lacework and former member of the AWS office of the CISO, joins Lindsey O'Donnel-Welch in this...
The Government Accountability Office found that various federal agencies don't have a comprehensive way to track cybercrime...
High-profile legal cases have set CISOs on edge about the liabilities they face while working through major security incidents...
Attackers are building innovative voice-based social engineering tactics into their malware and phishing campaigns.
The disclosure of the SolarWinds attack by FireEye is encouraging for the development of a national data breach reporting law, government and private-sector experts say.
With the cyber workforce gap looming, security hiring managers are looking in unconventional places and tweaking their job descriptions to appeal to candidates with "soft skills."
A 5G threat vector analysis by several federal agencies pointed to existing legacy infrastructure deployment weaknesses and supply-chain security challenges.
The Transparent Tribe APT has evolved its lures, expanded its victimology and added a new malware family to its arsenal.