Please turn on your JavaScript for this page to function normally.
Action1 RMM
Product showcase: Action1 RMM

Since the abrupt shift to remote work, effective endpoint management has become a top challenge in enterprise security. Patching and maintaining laptops and computers, …

backup
A unified approach is the future of data backup

Though disaster recovery and backup solutions have always been critical components for any business, the pandemic put a spotlight on the many threats to data today. Cybercrime …

ransomware
Despite good defensive measures, ransomware continues to get in

Traditional ransomware defenses are failing, with 54% of all victims having anti-phishing training and 49% having perimeter defenses in place at the time of attack, according …

DDoS
DDoS attacks increased 33% in H1 2021

There has been a 33% increase in the number of DDoS attacks in H1 2021, according to a report published by Link11. Between January and June, there were record numbers of …

vault
Image encryption technique could keep photos safe on popular cloud photo services

The past decade has witnessed scandal after scandal over private images maliciously or accidentally made public. A study from computer scientists at Columbia Engineering …

tools
Most companies still rely on manual tools and tech for internal audit processes

Despite volatility of the risk landscape in the wake of the COVID-19 pandemic, most organizations still rely on manual tools and technologies for internal audit processes, a …

EU
Europe’s IT and business services market propelled by growing cloud-based services adoption

Growing adoption of cloud-based services is propelling the expansion of the European IT and business services market, with the region setting a new record for as-a-service …

Dropbox
Dropbox continues building tools to protect personal content

Dropbox have made it easier to centralize, organize, and protect personal content. To start, they’ve improved camera uploads to make performance faster and more …

fake
Combating deepfakes: How we can future-proof our biometric identities

How worried should we be about deepfakes? What sort of threat do they pose to digital ID verification and the biometric technology that we are becoming so reliant on, and are …

identity theft
Is differential privacy the ideal privacy-enhancing computation technique for your business?

As security & risk management (SRM) leaders globally adjust to a “new normal” brought about by the COVID-19 pandemic, businesses must adapt their privacy programs for …

alert
IoT malware attacks rose 700% during the pandemic

Zscaler released a study examining the state of IoT devices left on corporate networks during a time when businesses were forced to move to a remote working environment. The …

mobile devices
Most financial services mobile apps still rely on passwords, even with added friction

Incognia announced a report which highlights results from their most recent study focusing on authentication and friction at login and the password reset process. The study …

Don't miss

Cybersecurity news