Future-proofing cybersecurity: Why talent development is key

In this Help Net Security interview, Jon France, CISO at ISC2, discusses cybersecurity workforce growth. He outlines organizations’ challenges, such as budget constraints and limited entry-level opportunities. France also points to the urgent nee… Continue reading Future-proofing cybersecurity: Why talent development is key

How digital wallets work, and best practices to use them safely

With the adoption of digital wallets and the increasing embedding of consumer digital payments into daily life, ensuring security measures is essential. According to a McKinsey report, digital payments are now mainstream and continually evolving, bring… Continue reading How digital wallets work, and best practices to use them safely

Why ransomware attackers target Active Directory

Ransomware attacks have surged 78% year-over-year, affecting various sectors and organizations and significantly impacting supply chains. In this Help, Net Security video, Craig Birch, Technology Evangelist, and Principal Security Engineer at Cayosoft,… Continue reading Why ransomware attackers target Active Directory

Behind the scenes of Serious Cryptography

In this Help Net Security interview, Jean-Philippe Aumasson, discusses the writing and research process for Serious Cryptography, his latest book. With a career steeped in research and practical cryptography, Aumasson offers a rare glimpse into the eff… Continue reading Behind the scenes of Serious Cryptography

Building a Microcontroller from Scratch: The B4 Thinker Project

PCB data sheet of a custom 4-bit microcontroller

[Marius Taciuc’s] latest endeavor, the B4 Thinker, offers a captivating glimpse into microcontroller architecture through a modular approach. This proof-of-concept project is meticulously documented, with a detailed, step-by-step guide to …read more Continue reading Building a Microcontroller from Scratch: The B4 Thinker Project