Security experts discuss the rise in cybercrime affecting sub-Saharan Africa and the necessary changes to improve security.
Read moreLeft unpatched, pair of vulnerabilities could give attackers wide access to a victim's application delivery network.
Read moreLeft unpatched, pair of vulnerabilities could give attackers wide access to a victim's application delivery network.
Read moreAnatomy of a Long-Con Phish
July 2 2020A fraudster on LinkedIn used my online profile in an apparent attempt to pull off a wide-ranging scam business venture.
Read moreAfter Senate Judiciary Committee pushes EARN IT Act a step closer to ratification, raising further concerns for privacy advocates, here's what to know.
Read moreConsiderations for Seamless CCPA Compliance
July 2 2020Three steps to better serve consumers, ensure maximum security, and achieve compliance with the California Consumer Privacy Act.
Read moreAn attacker scanned for databases misconfigured to expose information and wiped the data, leaving a ransom note behind.
Read moreStill thinking "the crooks probably won't find me if I make a security blunder"?
Read moreThe Security Value of Inefficiency
July 2 2020For decades, we have prized efficiency in our economy. We strive for it. We reward it. In normal times, that's a good thing. Running just at the margins is...
Read moreWe need to learn from the attacks and attempts that have occurred in order to prepare for the future.
Read more
Recent Comments