An Insider’s Account of Disclosing Vulnerabilities
December 3 2021Vendors drag their heels when it comes to identifying software vulnerabilities and are often loath to expedite the fixes.
Read moreVendors drag their heels when it comes to identifying software vulnerabilities and are often loath to expedite the fixes.
Read moreMatt Blaze tested a variety of Faraday cages for phones, both commercial and homemade.
The bottom line:
A quick and likely reliable “go/no go test” can be done with an...
Read more
Report explores cybercrime developments from the second half of 2020 through the first half of 2021.
Read moreResearchers also observed a 70% average increase in attempted ransomware attacks.
Read moreThe entertainment industry has long had to deal with the challenge of protecting their high-value content and intellectual property. Enter remote browser isolation (RBI).
Read moreThe entertainment industry has long had to deal with the challenge of protecting their high-value content and intellectual property. Enter remote browser isolation (RBI).
Read moreProactively updating and integrating technology, and ensuring tight collaboration between IT and security … it's simple, right? Well, not always – especially for organizations with limited resources.
Read moreThe breach, which compromised data such as insurance details and prescription information, took place between Oct. 9 and Oct. 17.
Read moreFor IT organizations, the global health crisis didn't make meeting current and future compliance obligations easier. Here are four content protection focus areas that help the enterprise maintain compliance...
Read moreFor IT organizations, the global health crisis didn't make meeting current and future compliance obligations easier. Here are four content protection focus areas that help the enterprise maintain compliance...
Read more
Recent Comments