Machine Learning for Environments with Bad Actors
Jenny Radcliffe on People Hacking
AFSA Extra Credit Podcast: Navigating Advertising During COVID-19
Compliance Perspectives: The Right Kind of Wrong
JOBS Act Implementation Regulations
North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more
Executive Summary - The North Korean threat to the crypto ecosystem is the highest form of immediate risk to the crypto-economy driven by a regime that seeks to profit from its misuse to reinforce its regime and fuel all its...more