Improve your app security on Azure

Application instance lock, Azure Virtual Network Manager and Network Watcher troubleshooting: tools for making the applications you run on Azure more secure. The post Improve your app security on... Read more »

1Password enables passkeys — a new option from passwords

Identity management company 1Password is spinning up a pair of new features that constitute a major shift away from passwords and toward their low-friction replacement: passkeys. The post 1Password... Read more »

Develop valuable cyber security skills over a lifetime for only $70

Not only do you get access to over 90 courses, but also career mentoring, skills evaluation, training on real cyber security projects, and much more. The post Develop valuable... Read more »

Checklist: Network and systems security

Cybersecurity demands and the stakes of failing to properly secure systems and networks are high. While every organization’s specific security needs form a unique and complex blend of interconnected... Read more »

Most people are aware of their data trails, but few know how to deal with it: Okta study

A new study by Okta finds that a proliferation of active accounts and web identities is exacerbating security risks both for individuals and enterprises. The post Most people are... Read more »

Modern Applications Require Modern Application Security

Application security is one of the most important components of an overall security program, yet some organizations struggle to identify and address their application security risks partly because they... Read more »

How to determine exactly what personal information Microsoft Edge knows about you

Users should be aware of what personal data is being collected and stored by Microsoft Edge and be prepared to perform periodic maintenance on that data to keep it... Read more »

8 best practices for securing your Mac from hackers in 2023

Best practices for securing your Mac against potential hacks and security vulnerabilities include enabling the firewall, using strong passwords and encryption, and enabling Lockdown Mode. The post 8 best... Read more »

Threatening botnets can be created with little code experience, Akamai finds

Researchers at Akamai’s Security Intelligence unit find a botnet specimen that reveals how successful DDoS, spam and other cyberattacks can be done with little finesse, knowledge or savvy. The... Read more »

Learn how to protect your company from cyberattacks for just $46

Cloud computing brings many business benefits, but it’s essential to know how to protect your data and operations. The post Learn how to protect your company from cyberattacks for... Read more »
Subscribe to our Newsletter