Get three years of a powerful VPN plus 30 days of anti-virus protection for $30

UltraVPN offers up to 10 simultaneous secure connections with unlimited bandwidth, over 1,000 servers in more than 100 virtual global locations and cool extra features. Protect your most sensitive... Read more »

Safeguarding customer information policy

Data breaches can cost companies tens of thousands of dollars or more and can pose a significant risk to company operations and reputation. Customer information is usually one of... Read more »

Remote work and the cloud create new endpoint security challenges

Cybersecurity has always been challenging, but with the cloud becoming more complex, the Internet of Things more advanced and remote work more embraced, security and endpoint management face a... Read more »

Australia plans to mandate file scanning for all tech companies

In an effort to target online child sexual abuse and pro-terror content, Australia may cause global changes in how tech companies handle data. The post Australia plans to mandate... Read more »

Network security policy

This policy from TechRepublic Premium will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the... Read more »

Hiring kit: GDPR data protection compliance officer

The European Union’s General Data Protection Regulation requires every business enterprise and public authority that collects personal data from EU customers and clients to protect that data from unauthorized... Read more »

Okta moves passkeys to cloud, allowing multi-device authentication

Okta’s formula for multi-device identity authentication for a hybrid workforce: extract passwords, add ease of passkeys across devices. The post Okta moves passkeys to cloud, allowing multi-device authentication appeared... Read more »

One overlooked element of executive safety: Data privacy

Practices such as using a separate email for sensitive activities and removing personal data from people search sites can help executives improve their data privacy. The post One overlooked... Read more »

AI vs AI: Next front in phishing wars

Threat intelligence firm Abnormal Software is seeing cybercriminals using generative AI to go phishing; the same technology is part of the defense. The post AI vs AI: Next front... Read more »

Akamai’s new study: Bots, phishing and server attacks making commerce a cybersecurity hotspot

The study shows attackers are using more bots and doing more sophisticated phishing exploits and server attacks, especially targeting retail. The post Akamai’s new study: Bots, phishing and server... Read more »
Subscribe to our Newsletter