Going Passwordless? Here Are 6 Steps to Get Started
April 11 2022High costs and user reluctance have stood in the way of passwordless adoption, but conversion can be simplified if you take it in more gradual steps.
Read moreHigh costs and user reluctance have stood in the way of passwordless adoption, but conversion can be simplified if you take it in more gradual steps.
Read moreAndy Greenberg wrote a long article — an excerpt from his new book — on how law enforcement de-anonymized bitcoin transactions to take down a global child...
Read moreScientists are now debating whether octopuses, squid, and crabs have emotions. Short answer: we don’t know, but can’t rule it out.
There may be a point when humans can...
Read more
SharkBot was hidden in apps masquerading as antivirus tools.
Read moreThe operation aimed to disrupt cyber espionage activity a Russian GRU group was using for the Ukraine war.
Read moreRansomware remained the most prevalent and impactful type of data security incident.
Read moreHalf of the IT professionals surveyed who use cloud services also employ infrastructure-as-a-service and platform-as-a-service.
Read moreA rogue line-continuation character can trick the code into validating just the second half of the line, but executing all of it.
Read moreSecurity Pro File: The former Army captain, whose security startup is on an upward trajectory, works hard to "make compliance suck less."
Read moreSome enterprise security tactics can backfire, pitting IT and security teams against the employees they’re trying to protect.
Read more
Recent Comments