An interdisciplinary research team constructs a way for companies to share breach data without revealing specific details that could exposes businesses to legal risk.
Read moreIn the wake of COVID-19, today's remote workforce is here to stay, at least for the foreseeable future. And with it, an increase in identity-related security incidents.
Read moreFake web alerts – how to spot and stop them
September 9 2020How do you spot and deal with fake system alerts on both computers and mobile devices?
Read moreNext-Gen Firewalls 101: Not Just a Buzzword
September 8 2020In a rare twist, "next-gen" isn't just marketing-speak when it comes to next-gen firewalls, which function differently than traditional gear and may enable you to replace a variety of...
Read moreMicrosoft Fixes 129 Vulnerabilities for September’s Patch Tuesday
September 8 2020This month's Patch Tuesday brought fixes for 23 critical vulnerabilities, including a notable flaw in Microsoft Exchange.
Read moreWordPress Plug-in Has Critical Zero-Day
September 8 2020The vulnerability in WordPress File Manager could allow a malicious actor to take over the victim's website.
Read moreGoogle Cloud Expands Confidential Computing Lineup
September 8 2020Google plans to build out its Confidential Computing portfolio with the launch of Confidential GKE Nodes for Kubernetes workloads.
Read moreVPNs: The Cyber Elephant in the Room
September 8 2020While virtual private networks once boosted security, their current design doesn't fulfill the evolving requirements of today's modern enterprise.
Read morePost-COVID-19 Cybersecurity Spending Update
September 8 2020Security spending growth will slow in 2020, but purse strings are looser than for other areas of IT.
Read more
Recent Comments