Shadow IT, where workers sometimes go rogue in their efforts to solve business problems, can create challenges – and opportunities – for companies in the best of times. With...
Read moreDigital Transformation Risks in Front-end Code
May 21 2020Why making every front-end developer a DevSecOps expert will lead to a more holistic approach to web and native application security. One important, often overlooked, area for empowering developers...
Read moreScandal engulfed popular videoconferencing software Zoom when its promise of providing end-to-end encryption (E2EE), turned out to be a lie. For years the Zoom client informed users that “Zoom...
Read moreResearchers shows most “flight-risk” employees planning to leave an organization tend to start stealing data two to eight weeks before they go. More than 80% of employees planning to...
Read moreAs COVID-19-themed spam rises, phishing-not so much. An analysis of newly registered domains finds that only 2.4% are actually phishing sites aiming to steal credentials. While many security firms...
Read moreBart Gellman on Snowden
May 20 2020Bart Gellman's long-awaited (at least by me) book on Edward Snowden, Dark Mirror: Edward Snowden and the American Surveillance State, will finally be published in a couple of weeks....
Read moreThe Chrome browser will tell users if their browser is up to date, malicious extensions are installed, and/or a password has been compromised. Google has launched new security and...
Read moreCriminals and the Normalization of Masks
May 20 2020I was wondering about this: Masks that have made criminals stand apart long before bandanna-wearing robbers knocked over stagecoaches in the Old West and ski-masked bandits held up banks...
Read moreThe FBI has warned ecommerce sites about attacks targeting a more than three-year-old flaw in the Magmi mass importer. Cybercriminals operating under the Magecart umbrella group are exploiting an...
Read more
Recent Comments