As we reimagine the post-pandemic workplace, we must also reevaluate post-pandemic email security practices.
Read moreName That Edge Toon: In Tow
June 1 2021Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreCISO Confidence Is Rising, but Issues Remain
June 1 2021New research reveals how global CISOs dealt with COVID-19 and their plans for 2022-2023.
Read moreThe Cyberspace Solarium Commission worked with legislators and the Trump administration to get 27 recommendations implemented in policy last year. It's aiming for 30 more in 2021.
Read moreThe website for the M1racles security vulnerability is an excellent demonstration that not all vulnerabilities are exploitable. Be sure to read the FAQ through to the end. EDITED TO ADD:...
Read more3 SASE Misconceptions to Consider
May 31 2021SASE is all the rage, promising things IT leaders have long dreamed about, but a purist approach may create consequences.
Read moreUsing Fake Reviews to Find Dangerous Extensions
May 29 2021Fake, positive reviews have infiltrated nearly every corner of life online these days, confusing consumers while offering an unwelcome advantage to fraudsters and sub-par products everywhere. Happily, identifying and...
Read moreInteresting research paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.
Read moreSecurity vendor says it has observed threat groups using a set of 16 tools specifically designed to attack Pulse Secure devices since April 2020.
Read moreChart: Cloud Concerns
May 28 2021As more organizations make their way to the cloud, their eyes are wide open to the associated cybersecurity risks that tag along for the ride.
Read more
Recent Comments