Passwordless authentication advocates see 2020 as a potential turning point year for the technology. But can the industry get off the dime? The cause of breaches has been well-known...
Read moreSenators Call for End to Controversial NSA Program
December 7 2019The program for collecting telephone call metadata has faced increased scrutiny and restrictions since Edward Snowden revealed its existence in 2013. Republicans and Democrats in Congress have come together...
Read moreSenators Call for End to Controversial NSA Program
December 7 2019The program for collecting telephone call metadata has faced increased scrutiny and restrictions since Edward Snowden revealed its existence in 2013. Republicans and Democrats in Congress have come together...
Read moreMoney meant to fund an Israeli startup wound up directly deposited to the scammers. Some cyberattacks involve extremely sophisticated tools and cutting-edge exploits. Others, not so much. A case...
Read moreMoney meant to fund an Israeli startup wound up directly deposited to the scammers. Some cyberattacks involve extremely sophisticated tools and cutting-edge exploits. Others, not so much. A case...
Read moreData Center Provider CyrusOne Confirms Ransomware Attack
December 7 2019The attack struck CyrusOne’s managed services division and compromised six customers primarily serviced by a New York data center. CyrusOne, a major provider of data center facilities with more...
Read moreData Center Provider CyrusOne Confirms Ransomware Attack
December 7 2019The attack struck CyrusOne’s managed services division and compromised six customers primarily serviced by a New York data center. CyrusOne, a major provider of data center facilities with more...
Read more10 Security ‘Chestnuts’ We Should Roast Over the Open Fire
December 6 2019These outdated security rules we all know (and maybe live by) no longer apply. As 2019 draws to a close, it’s a good time to take stock of the...
Read more10 Security ‘Chestnuts’ We Should Roast Over the Open Fire
December 6 2019These outdated security rules we all know (and maybe live by) no longer apply. As 2019 draws to a close, it’s a good time to take stock of the...
Read moreSeeing its firewall sales softening, the security vendor makes another acquisition to reorient itself for the cloud era. “We believe the addition of Aporeto’s unique machine identity technology will...
Read more
Recent Comments