Where are the ‘Great Exits’ in the Data Security Market?
October 13 2020If data security were a student, its report card would read "Not performing to potential." Here's why.
Read moreIf data security were a student, its report card would read "Not performing to potential." Here's why.
Read moreThis popular smartwatch aimed at kids had a backdoor that received covert encrypted commands via SMS.
Read moreRecent efforts by USCYBERCOM and Microsoft to disrupt the Trickbot botnet highlight the importance of partnerships in successful malware botnet disruption.
Read moreIt's time for state governments to act as leaders, adopt digital ID standards, enable new online voting systems, and provide broad-based access to all communities for the benefit of...
Read moreOne of the things we learned from the Snowden documents is that the NSA conducts “about” searches. That is, searches based on activities and not identifiers. A normal search...
Read moreThe attack, which now includes extortion components, has moved into its second week.
Read moreThe crooks haven't yet been caught and arrested, but their malware distribution network has been hit hard.
Read moreMicrosoft and security firms ESET, Black Lotus Labs, and Symantec collaborated with the financial services industry to cut off the ransomware operation's C2 infrastructure.
Read moreMany services advertise E2EE, but not all of them actually offer it.
Read moreEven if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain.
Read more
Recent Comments