How stolen credentials for services like Zoom and password reuse practices threaten to compromise other accounts and applications.
Read moreBlock/Allow: The Changing Face of Hacker Linguistics
July 27 2020Terms such as "whitelist," "blacklist," "master," and "slave" are being scrutinized again and by a wider range of tech companies than ever before.
Read moreMonday review – our recent stories revisited
July 27 2020Our most recent articles and videos, all in one place.
Read moreThe company, already known for its vulnerability management capabilities, announces the acquisition of EDR provider Spell Security and the launch of its own service for managing endpoints and responding...
Read more7 Summer Travel Security Tips
July 25 2020With staying safe during the pandemic high priority, it's easy to let your guard down about the security of the devices you take along your travels.
Read moreOrganizations Continue to Struggle With App Vulns
July 24 2020A high percentage of discovered bugs remain unremediated for a long time, a new study shows.
Read moreWearables company Garmin shut down its website, app, call centers, and other services in the aftermath of a security incident.
Read moreJob market data from the second quarter suggests there are increasing opportunities for women and minorities in the world of remote work, but long-standing biases may provide resistance.
Read moreAccess to Internal Twitter Admin Tools Is Widespread
July 24 2020More than 1,000 individuals have access to tools that could have aided the attackers in the recent Twitter attack on high-profile accounts.
Read more
Recent Comments