Why small businesses may want to pursue virtual CISO

At first glance, a vCISO may seem out of the budget, but SMBs might be missing out on some major benefits. The post Why small businesses may want to... Read more »

Speek! is a new encrypted chat service that uses Tor to offer secure communication

If you’re looking for an encrypted chat service for nearly any platform, Jack Wallen believes Speek! might be just what you need. The post Speek! is a new encrypted... Read more »

Compromised academic credentials available on cybercriminal platforms

Academic partners of identified American colleges and universities are being warned that their credentials are being sold or sometimes even provided for free on criminal marketplaces and forums. Read... Read more »

This is the most effective Apple mobile device management service

Jamf Now helps teams manage and optimize their Apple devices. The post This is the most effective Apple mobile device management service appeared first on TechRepublic. Read more »

DevSecOps glossary: Important terms for security professionals

The world of cybersecurity is constantly changing. Improve your DevSecOps knowledge with these critical concepts. The post DevSecOps glossary: Important terms for security professionals appeared first on TechRepublic. Read more »

Hottest cybersecurity jobs

Cybersecurity is becoming an increasingly more important field than ever before and jobs in this industry will only become more sought after as the years roll by. The post... Read more »

Critical Microsoft vulnerabilities decreased 47% in 2021

Only 104 critical vulnerabilities were reported in 2021, an all-time low for the world’s largest software company. The post Critical Microsoft vulnerabilities decreased 47% in 2021 appeared first on... Read more »

Old Python package comes back to life and delivers malicious payload

A recently spotted supply chain attack abused an old but legitimate Python package to deliver a malicious payload. Read more on how the attacker managed to do it and... Read more »

Microsoft Defender vs Trellix: EDR software comparison

Looking to secure your network? Microsoft Defender and Trellix are two of the most popular endpoint detection and response software options. Compare the features of these EDR tools. The... Read more »

NordLayer makes it easy for businesses to add VPN technology to remote workers

Your enterprise needs a VPN. Consider NordLayer as your solution. The post NordLayer makes it easy for businesses to add VPN technology to remote workers appeared first on TechRepublic. Read more »
Subscribe to our Newsletter