Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.
New guidelines from the NSA highlight best security practices for deploying and operating AI systems.
Compromised credentials are at the root of many intrusions, but there are ways to reduce the threat from stolen credentials.
The Ransomware Task Force’s most recent report shows how the industry needs to rely on more than takedown operations in order to have more effective, long-term impacts in combating ransomware.
The ransomware attack on Change Healthcare included the theft of PHI and PII, the company said.