
Signal Protocol Upgraded with Quantum Resistant Encryption – ThreatWire
This video is from Hak5.
Read More
In the Clouds (E27) ft. Matt Butcher
In this episode of In the Clouds, join your host Stu Miniman as he sits down with Fermyon CEO Matt Butcher, amidst their release of their new NoOps Database for developers building Serverless Applications; with WebAssembly. The Cloud Tech revolutionary is also open source and partners with Red Hat often in the field. Matt Butcher, […]
Read More

What is Continuous Automated Red Teaming (CART)?
While red teaming evaluates an organization’s security stance at a specific time, it can prove costly and time-consuming. Enter Continuous Automated Red Teaming (CART), a game-changing approach that revolutionizes red teaming in cybersecurity. In this video, Sam Hector explains how by operating seamlessly round-the-clock, CART tackles these challenges head-on, delivering dynamic and cost-effective security assessments […]
Read More
How Much Does a Data Breach Cost?
How much does it cost when hackers breach an organization’s cybersecurity? How long does it take to contain? How do you reduce the cost and recover faster? Jeff Crume provides a summary of the IBM Cost of a Data Breach 2023, the methodologies, and recommendations to improve your organization’s IT security and protect your data […]
Read More
Get the Job You Want: Essential Cyber Security Projects for Beginners
This video from UnixGuy | Cyber Security Career will help you start your cybersecurity career.. .
Read More
Cybersecurity Modernization
Advances in AI are impacting many industry disciplines and cybersecurity is no different. The tried-and-true strategies for threat management and detection are evolving to take advantage of AI, making their approach more proactive. In this video from IBM Technology, Bob Kalka of presents the developing landscape of cybersecurity based on years of consulting with companies like […]
Read More
Uncovering the History of STUXNET: The World’s First Cyber Weapon
- Frank
- July 20, 2023
- Atom bomb
- atomic bomb
- Blackhat
- blackhat hacker
- centrifuge
- Code
- cyber defense
- cyber security
- cyber war
- cyber weapon
- Cyberwar
- cyberweapon
- Internet
- Malware
- manhattan project
- manhatten project
- Military
- Natanz
- nuclear energy
- nuclear explosion
- nuclear fuel
- nuclear plant
- nuclear power
- nuclear project
- operation olympic games
- stuxnet
- stuxnet malware
- United States
- Upper Echelon
- us
- viruses
- zero day
When considering the impact of modern warfare, the gravity of cyber operations is very often overlooked by the general public. We have no idea where this is going. This video is from Upper Echelon. “Stuxnet” is the worlds first known Cyber Weapon. Initially deployed against Iran, the program eventually escaped containment, spreading to the world […]
Read More