Decipher Library: Holiday Edition 2023
Our annual holiday book recommendation guide is here to help you discover what to read during your holiday downtime.
In her previous position at Threatpost, Lindsey covered all aspects of the cybersecurity industry - from data privacy regulatory efforts to the evolution of underground cybercriminal marketplaces. Prior to that, Lindsey specialized in writing about microprocessors, enterprise business technology and the Internet of Things at CRN. In Lindsey’s spare time, she enjoys playing tennis and traveling.
Our annual holiday book recommendation guide is here to help you discover what to read during your holiday downtime.
Merritt Baer, field CISO at Lacework and former member of the AWS office of the CISO, joins Lindsey O'Donnel-Welch in this week's
The Government Accountability Office found that various federal agencies don't have a comprehensive way to track cybercrime data,
Researchers have discovered a sophisticated post-exploitation framework being deployed on Microsoft Exchange servers to assist threat actors with credential harvesting and local reconnaissance.
Cybersecurity authorities from numerous counties warn that cybercriminals are increasingly targeting managed service providers (MSPs).
After Microsoft started blocking macros obtained from the internet by default, email attackers are exploring alternative techniques to distribute Emotet, Qakbot, IcedID and other payloads.
The U.S. government is offering monetary rewards for information about Conti's leaders, affiliates and operators.
The Better Cybercrime Metrics Act aims to help streamline the consistent reporting of cybercrime incidents.