Terms often used in discussions of cyber security, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at editor@thecyberwire.com.
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by security researchers Caitlin Hopkins, Diana Duvieilh, and Anna Seitz to discuss the latest trends in ...
Relativity CSO & CIO, Amanda Fennell, champions the data security of Relativity and its customers. She and her team were recognized as 2021 CSO50 award winners and received a 2021 Cybersecurity ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. The Biden administration is finalizing an ...
In this episode of Threat Vector, host David Moulton speaks with Margaret Kelley, a seasoned Digital Forensics and Incident Response Senior Consultant at Palo Alto Networks’ Unit 42. With a deep ...
In this episode, Perry & Mason talk about the challenges of watermarking AI content, trends in AI music generation (and how Spotify is capitalizing on them), OpenAI's new Genesis physics engine, and ...
Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft, is a frequently cited threat intelligence expert with a 19-year career leading global threat research and analyst teams. She ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. Welcome in! You’ve entered, Only Malware in the ...
Selena Larson is a Staff Threat Researcher and Lead, Intelligence Analysis and Strategy at Proofpoint on the Threat Research team. She collaborates with fellow researchers to identify and investigate ...