Malicious Office documents are the weapon of choice among cybercriminals, who use files to access remotely hosted malicious components. Email is a common means of delivering cyberattacks, and Microsoft...
Read moreIf your team is manually building cloud instances and networks for every application, you’re setting yourself up for a data breach. Forty-eight percent of companies have experienced application downtime,...
Read more7 Places Where Privacy and Security Collide
June 24 2018Privacy and security can experience tension at a number of points in the enterprise. Here are seven – plus some possibilities for easing the strain. (Image: Joyseulay) In a...
Read moreAt least 10 US cities running Click2Gov software have alerted citizens to a data breach, but it turns out the problem was in the application server. A discovery has...
Read moreDestructive Nation-State Cyberattacks Will Rise
June 24 2018More than 90 percent of respondents in a Tripwire survey in Europe expect attacks by state-sponsored threat actors to increase in the next 12 months. Incidents like last year’s...
Read more8 Security Tips for a Hassle-Free Summer Vacation
June 24 2018It’s easy to let your guard down when you’re away. Hackers know that, too. Image Source: Shutterstock via studiostoks It’s easy to let your security guard down when you’re...
Read moreWhite House Email Security Faux Pas?
June 23 2018The Executive Office of the President isn’t complying with the DMARC protocol, but that has fewer implications than some headlines would suggest. This year, US agencies rushed to implement...
Read moreResearchers at Black Hat USA will show how vulnerabilities in Microsoft’s Cortana highlight the need to balance security with convenience. Security vs. convenience is a delicate balance to strike...
Read moreThe U.S. Supreme Court today ruled that the government needs to obtain a court-ordered warrant to gather location data on mobile device users. The decision is a major development...
Read more
Recent Comments