An interdisciplinary research team constructs a way for companies to share breach data without revealing specific details that could exposes businesses to legal risk.
Read moreIn the wake of COVID-19, today's remote workforce is here to stay, at least for the foreseeable future. And with it, an increase in identity-related security incidents.
Read moreFake web alerts – how to spot and stop them
September 9 2020How do you spot and deal with fake system alerts on both computers and mobile devices?
Read moreUS Space Cybersecurity Directive
September 9 2020The Trump Administration just published “Space Policy Directive – 5“: “Cybersecurity Principles for Space Systems.” It’s pretty general:
Principles. (a) Space systems and their supporting infrastructure, including software, should...
Read more
Next-Gen Firewalls 101: Not Just a Buzzword
September 8 2020In a rare twist, "next-gen" isn't just marketing-speak when it comes to next-gen firewalls, which function differently than traditional gear and may enable you to replace a variety of...
Read moreMicrosoft Patch Tuesday, Sept. 2020 Edition
September 8 2020Microsoft today released updates to remedy nearly 130 security vulnerabilities in its Windows operating system and supported software. None of the flaws are known to be currently under active...
Read moreMicrosoft Fixes 129 Vulnerabilities for September’s Patch Tuesday
September 8 2020This month's Patch Tuesday brought fixes for 23 critical vulnerabilities, including a notable flaw in Microsoft Exchange.
Read moreWordPress Plug-in Has Critical Zero-Day
September 8 2020The vulnerability in WordPress File Manager could allow a malicious actor to take over the victim's website.
Read moreGoogle Cloud Expands Confidential Computing Lineup
September 8 2020Google plans to build out its Confidential Computing portfolio with the launch of Confidential GKE Nodes for Kubernetes workloads.
Read more
Recent Comments