LastPass source code breach – incident response report released
September 19 2022Wondering how you'd handle a data breach report if the worst happened to you? Here's a useful example.
Read moreWondering how you'd handle a data breach report if the worst happened to you? Here's a useful example.
Read moreIf we know a user is legitimate, then why would we want to make their user experience more challenging?
Read moreIf we know a user is legitimate, then why would we want to make their user experience more challenging?
Read moreTPx, a leading nationwide managed services provider (MSP) delivering cybersecurity, managed networks, and cloud communications, today announced the addition of penetration scanning to its Security Advisory Services portfolio.
Read moreCyberattacks keep inflicting more expensive damage, but firms are responding decisively to the challenge.
Read moreThe Washington Post is reporting that the US Customs and Border Protection agency is seizing and copying cell phone, tablet, and computer data from “as many as” 10,000...
Read moreChester Wisniewski on what we can learn from Uber: "Just because a big company didn't have the security they should doesn't mean you can't."
Read moreThis is surprisingly funny. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines...
Read moreAlleged teen hacker claims he found an admin password in a network share inside Uber that allowed complete access to ride-sharing giant's AWS, Windows, Google Cloud, VMware, and other...
Read moreFinancial services firms need to learn how — and when — to put machine learning to use.
Read more
Recent Comments