Breaches can happen to anyone, but a well-oiled machine can internally manage and externally remediate in a way that won't lead to extensive damage to a company's bottom line....
Read more2022 Security Priorities: Staffing and Remote Work
April 30 2022A comprehensive security strategy balances technology, processes, and people — and hiring and retaining security personnel and securing the remote workforce are firmly people priorities.
Read moreGood News! IAM Is Near-Universal With SaaS
April 29 2022The less-good news: IAM only works for applications your IT department knows about, so watch for "shadow IT" programs installed or written by users that leave a security gap.
Read moreQNAP and Synology say flaws in the Netatalk fileserver allow remote code execution and information disclosure.
Read moreThis scale of this month's encrypted DDoS attack over HTTPS suggests a well-resourced operation, analysts say.
Read moreYou Can Now Ask Google to Remove Your Phone Number, Email or Address from Search Results
April 29 2022Google said this week it is expanding the types of data people can ask to have removed from search results, to include personal contact information like your phone number,...
Read moreLearn how to find out which apps you've given access rights to, and how to revoke those rights immediately in an emergency.
Read moreVideo Conferencing Apps Sometimes Ignore the Mute Button
April 29 2022New research: “Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps“:
Abstract: In the post-pandemic era, video conferencing apps (VCAs) have converted previously private...
Read more
Take a Diversified Approach to Encryption
April 29 2022Encryption will break, so it's important to mix and layer different encryption methods.
Read more
Recent Comments