Fake web alerts – how to spot and stop them
September 9 2020How do you spot and deal with fake system alerts on both computers and mobile devices?
Read moreHow do you spot and deal with fake system alerts on both computers and mobile devices?
Read moreThe Trump Administration just published “Space Policy Directive – 5“: “Cybersecurity Principles for Space Systems.” It’s pretty general:
Principles. (a) Space systems and their supporting infrastructure, including software, should...
Read more
In a rare twist, "next-gen" isn't just marketing-speak when it comes to next-gen firewalls, which function differently than traditional gear and may enable you to replace a variety of...
Read moreMicrosoft today released updates to remedy nearly 130 security vulnerabilities in its Windows operating system and supported software. None of the flaws are known to be currently under active...
Read moreThis month's Patch Tuesday brought fixes for 23 critical vulnerabilities, including a notable flaw in Microsoft Exchange.
Read moreThe vulnerability in WordPress File Manager could allow a malicious actor to take over the victim's website.
Read moreGoogle plans to build out its Confidential Computing portfolio with the launch of Confidential GKE Nodes for Kubernetes workloads.
Read moreWhile virtual private networks once boosted security, their current design doesn't fulfill the evolving requirements of today's modern enterprise.
Read moreSecurity spending growth will slow in 2020, but purse strings are looser than for other areas of IT.
Read moreAdherence to data protection regulations requires a multidisciplinary approach that has the commitment of all employees. Expect to be asked questions like these.
Read more
Recent Comments