Microsoft, Apple versus China, spyware actors

It’s a cat-and-mouse struggle as tech giants Microsoft and Apple deal with persistent threats from China state actors and Pegasus spyware. Read more »

Australian Data Breach Costs are Rising — What Can IT Leaders Do?

Australian data breach costs have jumped over the last five years to $2.57 million USD, according to IBM. Prioritizing DevSecOps and incident response planning can help IT leaders minimize... Read more »

Cisco: Booming identity market driven by leadership awareness

A new study by Cisco Investments with venture capital firms finds that most CISOs find complexity of tools, number of solutions and users, and even jargon a barrier to... Read more »

Patch ‘Em or Weep: Study Reveals Most Vulnerable IoT, Connected Assets

Phones, tablets and workstations with unpatched CVEs are a clear and present danger. New Armis study lists the most vulnerable. Read more »

Vendor Comparison: DIY Home Security Systems

When it comes to DIY home security, there are many systems and components to consider and many decisions to make. This vendor comparison guide from TechRepublic Premium provides advice... Read more »

Securing Linux Policy

Linux is a powerful and customizable operating system that has been the backbone of many businesses for decades. This policy from TechRepublic Premium provides guidelines for securing Linux on... Read more »

UK’s NCSC Warns Against Cybersecurity Attacks on AI

The National Cyber Security Centre provides details on prompt injection and data poisoning attacks so organizations using machine-learning models can mitigate the risks. Read more »

RFP Templates and Guidebook

A request for proposal is a common method for soliciting vendor quotes and answers about potential product or service offerings. They specifically intend to gather details involving implementation, operations... Read more »

FBI-Led Global Effort Takes Down Massive Qakbot Botnet

After more than 15 years in the wild, the Qakbot botnet, a zombie network of over 700,000 computers worldwide, is hanging on the FBI’s trophy wall for now. Read more »

How to Go Passwordless with NordPass Passkeys

With passkeys, you no longer need to use a password to log into supported websites. Here’s how to use them with password manager NordPass. Read more »
Subscribe to our Newsletter