What Usability Means to Security Pros
June 4 2020The last thing cybersecurity executives and practitioners need are even more tools that are difficult to operate. Here's what they look for when assessing new tools.
Read moreThe last thing cybersecurity executives and practitioners need are even more tools that are difficult to operate. Here's what they look for when assessing new tools.
Read moreZoom was doing so well.... And now we have this: Corporate clients will get access to Zoom's end-to-end encryption service now being developed, but Yuan said free users won't...
Read moreGoogle has deleted an app from the Play Store that offered to delete Android software associated with China.
Read moreAn exhaustive inquiry published today by a consortium of investigative journalists says a three-part series KrebsOnSecurity published in 2015 on a Romanian ATM skimming gang operating in Mexico's top...
Read more'USBCulprit' is one of several tools that suggest previously known Cycldek group is more dangerous than previous assumed, security vendor says.
Read moreRemote Access Trojans (RATs) can be the beginning of very bad things on your network or workstations.
Read moreA proposed class-action lawsuit accuses Google of collecting browser data from people who used "private" mode.
Read moreA security researcher details how RobbinHood has changed and why it remains a threat for businesses to watch.
Read moreA 30-year-old macro technology for Microsoft Excel is finding new popularity as a cybersecurity attack vector.
Read moreOrganizations that fail to comply with these rules can get hit with backbreaking fines and class-action lawsuits.
Read more
Recent Comments