2017 has been a year of the biggest online identity thefts showing how scarce a commodity privacy and security have become.
Executives, developers and pretty much everyone else can take away important lessons from Uber’s recent hack
When hackers compromise your software distribution pipeline, more than security, you lose the trust and confidence of your customers.
The Equifax data breach should serve as a wake up call for all users to take ownership and responsibility of protecting their data
These management tips will protect your employees and customers against security incidents
Businesses rarely encrypt their email messages because good encryption is too hard to use. That’s changing. By Randy Battat, PreVeil Most business-to-business communication involves sensitive information – stuff that the […]
Cybersecurity is one of the most fluid and changing fields of the tech industry. Every year, new threats and challenges emerge, outpacing past records and expectations. In this respect 2016 […]
We’ve been saying this for many years: This year’s cyberattacks dwarfed last year’s. And in this regard, 2016 was no exception. From online fraud to account takeovers and data breaches, […]
By Gary Southwell, Seceon The insider threat has become one of today’s most pressing cyber security concerns. In 2016, the Insider Threat Report Spotlight found seventy-four percent of organizations feel […]
By Michael Conley Your internet security is something that must be constantly kept under control, but unfortunately for us, this is no easy task. As time goes by, cybercriminals are […]
By Ken Wilson, ThePCDoctor The world today is more connected than ever, and it will keep going that way. This leaves us open to cyber-attacks and our personal data at […]
As if I haven’t said it a million times, IoT security is critical. But just when I thought I had it all figured out, somebody comes along and sheds new […]
By Mike Raggo, Chief Research Scientist at ZeroFOX In today’s threatening age, it’s impossible to navigate the web without crossing paths with some sort of virus, threat or scam. In […]
As we close in on the 2016 U.S. presidential elections, the issue of cybersecurity threats is becoming increasingly serious. The not-so-recent hack of the DNC computer network, alleged to be […]
IT security teams at firms and organizations are mainly focused on protecting corporate networks against outsider intrusions, unaware of the dagger aimed at their backs, i.e. insider threats. What’s the […]
Websites are without a doubt a very – if not the most – attractive target for hackers. And when it comes to attack vectors, there’s no shortage of vulnerabilities in […]