Internet scan indicates hundreds of thousands of vulnerable installations, while data from the major Java repository suggests millions, firms say.
Read moreHow Do I Decide Whether to Buy or Build in Security?
April 4 2022To build or buy — that is the question. Security teams have to consider maintenance costs and compliance questions when they go down the build-it-yourself path.
Read moreBeware of These 5 Tax Scams
April 4 2022Fraudsters are out in full force as Tax Day approaches. Use this list to keep your company’s employees informed on what to watch out for this year.
Read moreCybersecurity Mesh: IT’s Answer to Cloud Security
April 4 2022With a properly functioning cybersecurity mesh architecture, one can guarantee safe, authorized access to data from any access point.
Read moreCybersecurity Mesh: IT’s Answer to Cloud Security
April 4 2022With a properly functioning cybersecurity mesh architecture, one can guarantee safe, authorized access to data from any access point.
Read moreWyze Camera Vulnerability
April 4 2022Wyze ignored a vulnerability in its home security cameras for three years. Bitdefender, who discovered the vulnerability, let the company get away with it.
In case you’re wondering, no,...
Read more
Backups aren't just limited to hard drives, databases and servers. This Tech Tip describes how organizations should expand their backup strategies.
Read moreApple’s Zero-Day Woes Continue
April 1 2022Two new bugs in macOS and iOS disclosed this week add to the growing list of zero-days the company has rushed to patch over the past year.
Read moreNew research on the changing migration of the Doryteuthis opalescens as a result of climate change. News article: Stanford researchers have solved a mystery about why a species of squid native...
Read moreEven the NSA has a malicious insider problem. The employee used his personal emails to send classified data to unauthorized outsiders on 13 different occasions.
Read more
Recent Comments