WordPress Security Checklist

Stories of virus and malware infections, data loss, system compromises and unauthorized access dominate headlines, and your WordPress website may be contributing to the problem. WordPress is the most... Read more »

Findlargedir: Find all “blackhole” directories with a huge amount of filesystem entries

Findlargedir is a tool written to help quickly identify “black hole” directories on any filesystem having more than 100k entries in a single flat structure. When a directory has... Read more »

At Black Hat, Splunk, AWS, IBM Security and Others Launch Open Source Cybersecurity Framework

With security schema, Splunk and collaborators aim to transform alert telemetry from cacophony to chorus with one taxonomy across vendors and tools. Read more »

Product showcase: Free email security test by ImmuniWeb Community Edition

According to an FBI report, in 2022, global losses from business email compromise (BEC) and email account compromise (EAC) attacks attained $43 billion, hitting a historic anti-record. Multiple cybersecurity... Read more »

Best Encryption Software and Tools for 2023

This is a comprehensive list of best encryption software and tools, covering their features, pricing and more. Use this guide to determine your best fit. Read more »

5 Best Encryption Key Management Software for 2023

What is the best encryption key management software for your business? Use our guide to compare the features of our top picks. Read more »

White House launches AI Cyber Challenge to make software more secure

The Biden-Harris Administration has launched a major two-year competition using AI to protect the United States’ most important software, such as code that helps run the internet and critical... Read more »

Microsoft Azure AI Adds GPT-4 and New Virtual Machines

Microsoft is working on creating guidelines for red teams making sure generative AI is secure and responsible. Read more »

8 Best Identity and Access Management (IAM) Solutions for 2023

Identity and access management software helps you maintain control of your environment by allowing authorized users to access company resources. Learn 10 of the top IAM tools to see... Read more »

Could C2PA Cryptography be the Key to Fighting AI-Driven Misinformation?

Adobe, Arm, Intel, Microsoft and Truepic put their weight behind C2PA, an alternative to watermarking AI-generated content. Read more »
Subscribe to our Newsletter