Top 10 open-source security and operational risks of 2023

Many software companies rely on open-source code but lack consistency in how they measure and handle risks and vulnerabilities associated with open-source software, according to a new report. The... Read more »

Google Workspace admins can now use client-side encryption on Gmail and Calendar

Organizations subject to government regulations can gain more control over their own security. The post Google Workspace admins can now use client-side encryption on Gmail and Calendar appeared first... Read more »

1Password is looking to a password-free future. Here’s why

With phishing-based credentials theft on the rise, 1Password CPO Steve Won explains why the endgame is to ‘eliminate’ passwords entirely. The post 1Password is looking to a password-free future.... Read more »

Pen testing report: IT budgets should focus on entire security stack

With nearly 90% of companies reporting cyberattacks, pen testing budgets are on the rise, with cloud infrastructure and services a key focus area, according to a new report. The... Read more »

Digital forensics and incident response: The most common DFIR incidents

A new State of Enterprise DFIR survey covers findings related to automation, hiring, data and regulations and more. The post Digital forensics and incident response: The most common DFIR... Read more »

Transmission of sensitive data policy

Data in transit means data is at risk if the proper precautions aren’t followed. Data stored inside a securely monitored environment is much less likely to fall into the... Read more »

DLL sideloading and CVE attacks show diversity of threat landscape

Studies from Bitdefender and Arctic Wolf show that new tactics are using twists on concealment in social media and old vulnerabilities in third-party software. The post DLL sideloading and... Read more »

Report: Stress will drive a quarter of cyber defenders out the door

There are too few cybersecurity experts to fill jobs, but a new study sees the crunch increasing through 2025 as cybersecurity experts head for the hills. The post Report:... Read more »

IBM: Most ransomware blocked last year, but cyberattacks are moving faster

A new study from IBM Security suggests cyberattackers are taking side routes that are less visible, and they are getting much faster at infiltrating perimeters. The post IBM: Most... Read more »

How to expand your search sources

Explore search services beyond Google and Bing for a wider range of results, customization and privacy options. The post How to expand your search sources appeared first on TechRepublic. Read more »
Subscribe to our Newsletter