Remote work and the cloud create new endpoint security challenges

Cybersecurity has always been challenging, but with the cloud becoming more complex, the Internet of Things more advanced and remote work more embraced, security and endpoint management face a... Read more »

Australia plans to mandate file scanning for all tech companies

In an effort to target online child sexual abuse and pro-terror content, Australia may cause global changes in how tech companies handle data. The post Australia plans to mandate... Read more »

Network security policy

This policy from TechRepublic Premium will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the... Read more »

Hiring kit: GDPR data protection compliance officer

The European Union’s General Data Protection Regulation requires every business enterprise and public authority that collects personal data from EU customers and clients to protect that data from unauthorized... Read more »

Okta moves passkeys to cloud, allowing multi-device authentication

Okta’s formula for multi-device identity authentication for a hybrid workforce: extract passwords, add ease of passkeys across devices. The post Okta moves passkeys to cloud, allowing multi-device authentication appeared... Read more »

One overlooked element of executive safety: Data privacy

Practices such as using a separate email for sensitive activities and removing personal data from people search sites can help executives improve their data privacy. The post One overlooked... Read more »

AI vs AI: Next front in phishing wars

Threat intelligence firm Abnormal Software is seeing cybercriminals using generative AI to go phishing; the same technology is part of the defense. The post AI vs AI: Next front... Read more »

Akamai’s new study: Bots, phishing and server attacks making commerce a cybersecurity hotspot

The study shows attackers are using more bots and doing more sophisticated phishing exploits and server attacks, especially targeting retail. The post Akamai’s new study: Bots, phishing and server... Read more »

CISA advisory on LockBit: $91 million extorted from 1,700 attacks since 2020

FBI, CISA and international organizations released an advisory detailing breadth and depth of LockBit, and how to defend against the most prevalent ransomware of 2022 and (so far) 2023.... Read more »

Hiring kit: Cryptographer

A cryptographer uses their expertise in mathematics and computer science to develop algorithms, ciphers and other encryption systems to protect sensitive data. It can be a difficult position to... Read more »
Subscribe to our Newsletter