NTSC Blog

NTSC Technology Security Roundup
May 21, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
May 14, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
May 7, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Wired Article Discusses Ray Ozzie’s Proposal to Solve the Encryption Debate
May 2, 2018

A recent Wired article details how Ray Ozzie has resurrected the call for a solution to the encryption debate by proposing an idea that pleases both sides.

Read More >

NTSC Technology Security Roundup
April 30, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Ohio State University CISO Helen Patton Explains How CISOs Actually Spend Their Time
April 26, 2018

Ohio State University CISO Helen Patton points out a dissonance between areas noted by many cybersecurity mind maps and the actual time CISOs spend in each area.

Read More >

NTSC Technology Security Roundup
April 23, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
April 16, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Turner CISO Pete Chronis Describes How Joining the NTSC Can Help the Cybersecurity Industry
April 10, 2018

In this Q&A, Chronis talks about the NTSC’s legislative influence, the unique nature of this organization, and why CISOs need to join now to have maximum impact on shaping our future efforts.

Read More >

U.S. Bank CISO Jason Witty Reflects on Joining the NTSC
April 10, 2018

In this short Q&A, Witty discusses why he joined the NTSC, why its mission is important, and why other CISOs need to get involved.

Read More >

NTSC Technology Security Roundup
April 9, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

CISOs Discuss Public-Private Sector Information Sharing, Partnerships, and Collaboration
April 6, 2018

CISOs received a front-row view of the federal government’s progress and concrete actions toward becoming a better partner to the private sector at the most recent NTSC Northeast Regional CISO Policy Roundtable on February 21, 2018.

Read More >

Aiming Toward the Moon: Pete Chronis of Turner Offers an Answer to our Cyber Conundrum
April 5, 2018

In an interview with the NTSC, Chronis talks about why he wrote "The Cyber Conundrum," the most challenging parts of the moonshot process, and how national cybersecurity legislation (through the help of groups such as the NTSC) can help solve our cyber conundrum.

Read More >

NTSC Technology Security Roundup
April 2, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
March 26, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Elevating Your Cybersecurity Brand & Reputation: An eBook from ZecurityAscent
March 22, 2018

A new eBook from ZecurityAscent, Elevating Your Cybersecurity Brand & Reputation, discusses how marketing and security teams need to work closely together to enhance and protect both brand and reputation.

Read More >

NTSC Technology Security Roundup
March 19, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Top 2018 Cybersecurity Predictions for CISOs
March 15, 2018

When the usual yearly prediction articles emerge about cybersecurity trends, they usually appear in a flurry from December to January and end abruptly—forgotten about until the next year. However, seeing as it’s part of our mission to stay on top of cybersecurity trends that impact CISOs, we became curious about what these articles actually predicted for 2018, if there were any consistent predictions across all articles, and if the major trends correlated to any national cybersecurity policy issues that we track.

Read More >

Juniper Networks’ Laurence Pitt Talks About NIST Cybersecurity Framework in Dark Reading Article
March 14, 2018

Juniper Networks’ Laurence Pitt discusses some key features of the version 1.1 updates of the NIST draft that’s currently circulating for public review with a planned spring release.

Read More >

NTSC Technology Security Roundup
March 12, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
March 5, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
February 26, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies
February 22, 2018

Threat groups successfully used business email compromise (BEC) scams to convince accounts payable personnel at some Fortune 500 companies to initiate fraudulent wire transfers into attacker-controlled accounts.

Read More >

NTSC Technology Security Roundup
February 19, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Academic Fellow Peter Swire Analyzes CLOUD Act in Lawfare
February 16, 2018

In an article for Lawfare, NTSC Academic Fellow and Georgia Tech Professor Peter Swire (with co-writer Andrew Keane Woods of the University of Kentucky College of Law) points out why the CLOUD Act “represents a very compelling start.”

Read More >

NTSC Technology Security Roundup
February 12, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Council of Foreign Relations Wants US Baseline Data Protection Law
February 7, 2018

The Council of Foreign Relations (CFR) recently released a report titled “Reforming the U.S. Approach to Data Protection and Privacy” that argues for a U.S. baseline data protection law.

Read More >

NTSC Technology Security Roundup
February 5, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Board Member Pete Chronis Featured in Variety
February 1, 2018

Exclusively shared with Variety, Turner’s Digital Identity Protection Guide was created by NTSC Board Member and Turner CISO Pete Chronis and his team to explain how employees can secure their email and social media accounts

Read More >

NTSC Technology Security Roundup
January 29, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Board Member and US Bank CISO Jason Witty Featured in American Banker Article
January 25, 2018

NTSC Board Member and US Bank CISO Jason Witty was recently featured in an American Banker article about the cybersecurity talent shortage.

Read More >

NTSC Technology Security Roundup
January 22, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Board Member and Ohio State University CISO Helen Patton Featured in Security Current Report
January 18, 2018

NTSC Board Member and Ohio State University CISO Helen Patton was featured in a report from Security Current titled "CISOs Investigate: Endpoint Security."

Read More >

NTSC Technology Security Roundup
January 16, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Board Member and Turner CISO Pete Chronis Featured in Wall Street Journal Interview
January 12, 2018

Talking about the cybersecurity role of corporate boards, NTSC Board Member and Turner CISO Pete Chronis was interviewed by Wall Street Journal Business Editor Jamie Heller along with Comcast’s Myrna Soto.

Read More >

NTSC Technology Security Roundup
January 8, 2018

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
December 22, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
December 18, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
December 11, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Banks Participate in Sheltered Harbor Project to Prepare for Worst-Case Cyberattack Scenario
December 4, 2017

What if ATMs stop working? What if a cyberattacker destroys or locks financial data at a major bank? Some cybersecurity experts in the financial sector fear that a major cyberattack may not only cause a run on the bank affected but also on other banks. To head off this worst-case scenario, the Wall Street Journal recently reported that banks and credit unions have created the Sheltered Harbor project.

Read More >

NTSC Technology Security Roundup
December 4, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
November 27, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
November 20, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
November 13, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
November 6, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
October 30, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

A Thirst for Cybersecurity Talent—Ideas on Training and Exciting the Next Generation of Security Professionals
October 27, 2017

This article examines key drivers of the cybersecurity talent shortage, how to solve the root problems, and why government support is so important.

Read More >

Michael Chertoff Discusses How CISOs Must Focus on Risk Management, Not Risk Elimination
October 27, 2017

In a recent article from Security Magazine, the Honorable Michael Chertoff (Co-Founder and Executive Chairman of the Chertoff Group and U.S. Department of Homeland Security Secretary from 2005 to 2009) talks about how enterprises must focus on risk management rather than risk elimination.

Read More >

NTSC National CISO Policy Conference Recap: The Panels
October 26, 2017

In our last post, we summarized the discussion highlights from our stellar keynote speakers at the inaugural NTSC National CISO Policy Conference. In this post, you’ll see how our panel discussions brought out an incredible amount of dialogue amongst CISOs about some critically important topics—and we’re sure that many of these discussions are continuing!

Read More >

NTSC National CISO Policy Conference Recap: The Keynotes
October 26, 2017

Now that the dust has settled after our inaugural NTSC National CISO Policy Conference, I think it’s a good time to reflect upon some of the substantial, important discussions that CISOs and other senior technology stakeholders shared with our distinguished keynote speakers.

Read More >

NTSC Technology Security Roundup
October 23, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

​Cyber Policies: A Dog’s Breakfast
October 17, 2017

Helen Patton, CISO of Ohio State University, talks about why cyber policies suck, what can be done, and why organizations such as the NTSC are crucial for helping develop policies that truly protect our systems and information.

Read More >

NTSC Technology Security Roundup
October 16, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Reflections from the Deck: Basking in the Glow of the NTSC’s Inaugural Policy Conference
October 10, 2017

NTSC Executive Director Patrick Gaul reflects upon the success of the inaugural NTSC National CISO Policy Conference and looks forward to the road ahead.

Read More >

NTSC Technology Security Roundup
October 9, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Celebrating 2017 Progress at the Inaugural NTSC National CISO Policy Conference
October 3, 2017

Over the last year, we have made significant inroads toward fulfilling this mission. As part of celebrating our inaugural NTSC National CISO Policy Conference, we wanted to take a few moments to reflect on the progress of our CISO community this year.

Read More >

NTSC Technology Security Roundup
October 2, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
September 25, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
September 18, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
September 11, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
September 5, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
August 28, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Voice of the CISO Needed to Help Influence Cyber Policy
August 23, 2017

Tim Callahan, Global CISO of Aflac, talks about why CISOs need a greater voice in public policy and why participation in our inaugural NTSC National CISO Policy Conference is an important step in that direction.

Read More >

NTSC Technology Security Roundup
August 21, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
August 14, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
August 7, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
July 31, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
July 24, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Preventing Unwanted Files in Enterprise Networks
July 21, 2017

Today’s information security systems must go a step further in providing the right level of visibility into incoming files because there can be more than one correct answer to a file’s true type. Here are three ways information technology teams can elevate their file typing methods using static analysis, a preferred method of analysis over dynamic analysis because it’s safer, faster, and requires less overhead.

Read More >

NTSC Technology Security Roundup
July 17, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
July 10, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

IBM Security’s Wendi Whitmore Talks About Petya
July 6, 2017

In this Q&A, IBM Security's Wendi Whitmore discusses the nature of Petya, its impact, and what CISOs should take away from the cyberattack.

Read More >

Special NTSC News Roundup: Petya
July 6, 2017

We’ve collected and curated a variety of articles that will get you up to speed on Petya and offer a variety of viewpoints about this latest attack.

Read More >

NTSC Technology Security Roundup
July 3, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
June 26, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

The Human Error of Ignoring Machine Learning Cybersecurity
June 22, 2017

Recent surveys by universities, tech giants, and consulting firms alike point to an emerging paradox: a rabid hunger for machine learning (ML) technology that gives organizations the next competitive edge, coupled against an unclear plan about what to do with it – especially when it goes wrong. Because much of today’s ML technology is explorational but progressing quickly, it’s fair to infer that how to approach, manage, and triage it inside an organization represents unknown territory for business leadership. Nonetheless, this is the ideal time for important conversations around the cybersecurity of ML to take place.

Read More >

NTSC Technology Security Roundup
June 19, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

New Cybersecurity Executive Order: Reports, Reports, and More Reports
June 15, 2017

Although most of the EO’s immediate action items are studies or reports, those can be the beginning of significant policy change—precisely where the interests of NTSC members lie.

Read More >

Consideration of Intent in Cyber Public Policy
June 12, 2017

In my last article, “Striking a Balance in the Grey Zone,” I suggested standardized licensing of Digital Forensic Investigators (DFI) to move the conversation of active defense governance forward. However, CISOs can get a lot more out of passive defense with a lower risk to their organizations by some minor changes to current laws.

Read More >

NTSC Technology Security Roundup
June 12, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
June 5, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
May 30, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
May 22, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
May 17, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Striking a Balance in the Gray Zone
May 8, 2017

This article discusses the idea of Digital Forensic Investigations Licenses and high level instructions for authorized individuals to help active defense.

Read More >

NTSC Technology Security Roundup
May 8, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
May 1, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
April 24, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Why CISOs Should Care About Developments in the EU
April 18, 2017

Two recent developments in EU privacy should draw the attention and energy of chief information security officers (CISOs).

Read More >

NTSC Technology Security Roundup
April 17, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
April 10, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
April 3, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Highlights from Patrick Gaul’s Podcast Interview on “Through the Noise”
March 30, 2017

During a wide-ranging interview on a recent episode of “Through the Noise”—a business podcast led by hosts Blake Althen and Ernesto Gluecksmann—our Executive Director, Patrick Gaul talked about many important cybersecurity issues and trends of interest to CISOs and the NTSC.

Read More >

NTSC Publishes National Data Breach Notification Legislation Article in the Atlanta Business Chronicle
March 28, 2017

Written by NTSC Executive Director Patrick Gaul, his article talks about the devastating costs of a data breach to companies in the United States and why we need a national data breach notification law to reduce those costs.

Read More >

NTSC Technology Security Roundup
March 27, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Georgia Tech’s Demo Day Finale Showcases Students’ Commercial Cybersecurity Concepts
March 21, 2017

On April 13, 2017, Georgia Tech’s cybersecurity research labs will hold its second annual “Demo Day Finale.” At this event, information security student teams at Georgia Tech will compete before venture capitalists and industry leaders by presenting cybersecurity concepts for possible commercialization.

Read More >

NTSC Technology Security Roundup
March 20, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
March 13, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Ransomware for Industrial Control Systems–the Next Frontier?
March 9, 2017

The threat of ransomware will be minimized as asset owners monitor their ICS networks and use best practices when securing their systems.

Read More >

NTSC Technology Security Roundup
March 6, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Designation ‘Critical Infrastructure’: What It Does and Doesn’t Mean for States and Their Vendors
March 3, 2017

Cyber threats to election systems are very real and warrant more scrutiny. A chief practical concern is protecting the personally identifiable information contained in registration databases, but electoral integrity and freedom from foreign influence is of course paramount. The summer of 2016 alone saw two confirmed penetrations of election databases in Illinois and Arizona, later attributed to Russia, and over twenty other confirmed attempts. Secure election systems will not be an easy or quick effort to synchronize, due to wide-varying system disparity in all 50 states, but moving forward under one federal standard is a good first step in the right direction.

Read More >

NTSC Technology Security Roundup
February 27, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
February 20, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Attribution and its Role in Deterrence
February 15, 2017

With accurate attribution, organizations have a better chance of preventing, correcting, and ensuring operational continuity.

Read More >

NTSC Technology Security Roundup
February 15, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Southeast Regional CISO Policy Roundtable
February 13, 2017

During the inaugural NTSC Southeast Regional CISO Policy Roundtable, CISOs discussed the present and future implications of cybersecurity policy.

Read More >

NTSC Technology Security Roundup
February 6, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

U.S. Businesses Need to Prepare Now to Align with EU Privacy Law
January 30, 2017

Passed by the European Commission in early 2016 and set to take effect in 2018, the GDPR intends to “give citizens back the control of their personal data” and to unify the European regulatory environment on data privacy for international commerce. Now is the time, as businesses review annual 2017 financial plans and operations, to consider the cybersecurity consequences of not preparing for GDPR.

Read More >

NTSC Technology Security Roundup
January 30, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
January 23, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
January 16, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
January 9, 2017

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

Does Your Corporate Information Security Culture Stack Up?
January 9, 2017

When analyzing cyberattacks, many discussions focus on the one employee who clicked on an email attachment or fell susceptible to social engineering. But human error extends to people, teams, and entire corporate cultures where critical cybersecurity decisions and assumptions are made that result in devastating consequences.

Read More >

NTSC Technology Security Roundup
December 26, 2016

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
December 20, 2016

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >

NTSC Technology Security Roundup
December 14, 2016

NTSC's Weekly Technology Security News Roundup, published weekly from various technology security resources and summarized for your viewing.

Read More >