Android-based two-factor authentication now works for Google applications on iPad and iPhone. Google now has extended its Android-based two-factor authentication to Google applications on iOS devices like iPads and iPhones....
Read more7 Truths About BEC Scams
June 16 2019Business email compromise attacks are growing in prevalence and creativity. Here’s a look at how they work, the latest stats, and some recent horror stories. Last summer, the US...
Read more7 Truths About BEC Scams
June 16 2019Business email compromise attacks are growing in prevalence and creativity. Here’s a look at how they work, the latest stats, and some recent horror stories. Last summer, the US...
Read moreCongress Gives ‘Hack Back’ Legislation Another Try
June 16 2019Officials reintroduce a bill that would let businesses monitor attacker behavior and target intruders on corporate networks. “Hacking back,” the largely controversial concept by which organizations can target intruders...
Read moreCongress Gives ‘Hack Back’ Legislation Another Try
June 16 2019Officials reintroduce a bill that would let businesses monitor attacker behavior and target intruders on corporate networks. “Hacking back,” the largely controversial concept by which organizations can target intruders...
Read moreThe development follows speculation and concern among security experts that the attack group would expand its scope to the power grid. The attackers behind the epic Triton/Trisis attack that...
Read moreThe development follows speculation and concern among security experts that the attack group would expand its scope to the power grid. The attackers behind the epic Triton/Trisis attack that...
Read more10 Notable Security Acquisitions of 2019 (So Far)
June 15 2019In a year when security companies have been snapped up left and right, these deals stand out from the chaos. (Image: Itchaznong – stock.adobe.com) Anyone watching the cybersecurity market...
Read more10 Notable Security Acquisitions of 2019 (So Far)
June 15 2019In a year when security companies have been snapped up left and right, these deals stand out from the chaos. (Image: Itchaznong – stock.adobe.com) Anyone watching the cybersecurity market...
Read moreNo organization can prioritize and mitigate hundreds of risks effectively. The secret lies in carefully filtering out the risks, policies, and processes that waste precious time and resources. In...
Read more
Recent Comments