What Is Secure Access Service Edge?

There has been plenty of hype around secure access service edge. Some even say it is replacing legacy network and security architectures. Drew Robb, writing for TechRepublic Premium, lays... Read more »

ISC2 Security Congress 2024: The Landscape of Nation-State Cyber Attacks

CISA advisor Nicole Perlroth closed out ISC2 Security Congress’ keynotes with a wake-up call for security teams to watch for nation-state-sponsored attacks. Read more »

Australia’s New Scam Prevention Laws: What You Need to Know

Australia’s Scam Prevention Framework aims to protect consumers by holding tech, banking, and telecom sectors accountable, with fines up to $50 million. Read more »

The 6 Best Antivirus Software Providers for Mac in 2024

Macs may need additional antivirus protection in a business environment or high-risk use case. Bitdefender is the best overall Mac antivirus provider when it comes to protection, usability, and... Read more »

Can You Fax a Check? Yes. Follow These Steps to Do it Safely

Discover how to legally, securely, and quickly fax a check whether you’re using a traditional fax machine or an online faxing service. Read more »

Microsoft: Ransomware Attacks Growing More Dangerous, Complex

Attackers launched 600 million cybercriminal and nation-state threats on Microsoft customers daily, including ransomware attacks, in the last year, according to the tech giant. Read more »

Number of Active Ransomware Groups Highest on Record, Cyberint’s Report Finds

This indicates that the most prominent ransomware groups are succumbing to law enforcement takedowns, according to researchers from Cyberint. Read more »

NIS 2 Compliance Deadline Arrives: What You Need to Know

The NIS 2 compliance deadline is Oct. 17. Discover essential insights on requirements, impacts, and what organisations must do now. Read more »

Zscaler Report: Mobile, IoT, and OT Cyber Threats Surge in 2024

A new report reveals a 2024 surge in mobile, IoT, and OT cyberattacks, highlighting key trends and the need for zero-trust security. Read more »

7 Security and Compliance Tips From ISC2 Security Congress

An IT and security compliance analyst distilled seven ways to forge effective synergies between IT and broader business goals. Read more »
Subscribe to our Newsletter