Standards need to reflect that most endpoints will be remote and/or wireless.
Read moreAmazon Redshift customers can use Baffle’s Data Privacy Cloud to secure the data pipeline as source data is migrated to Redshift and used for data analytics.
Read moreNew Android Spyware Variants Linked to Middle Eastern APT
November 23 2021The new variants, improved for stealth and persistence, share code with other malware samples attributed to the C-23 APT.
Read moreWhy Should I Adopt a Zero Trust Security Strategy?
November 23 2021Zero Trust is the right approach for protecting your end users. Executing it in the right way will also help you comply with the NIST standards and upcoming federal...
Read moreApple Sues NSO Group for Spyware Use
November 23 2021The company seeks to hold Israeli firm NSO Group liable for the targeting of Apple users and requests a permanent injunction to ban its use of Apple products and...
Read moreHoliday Scams Drive SMS Phishing Attacks
November 23 2021Attackers typically target consumers with malicious text messages containing obfuscated links, but experts say businesses are threatened as well.
Read moreHow Sun Tzu’s Wisdom Can Rewrite the Rules of Cybersecurity
November 23 2021The ancient Chinese military strategist Sun Tzu would agree: The best defense is to avoid an attack in the first place.
Read moreHow Sun Tzu’s Wisdom Can Rewrite the Rules of Cybersecurity
November 23 2021The ancient Chinese military strategist Sun Tzu would agree: The best defense is to avoid an attack in the first place.
Read moreEach security step, no matter how small, can have great impact in detecting and deterring cyber theft.
Read more
Recent Comments