Please turn on your JavaScript for this page to function normally.
hotel
Cybersecurity guide for the hospitality industry

A practical cybersecurity guide from the National Institute of Standards and Technology (NIST) can help hotel owners reduce the risks to a highly vulnerable and attractive …

Door
Encryption is either secure or it’s not – there is no middle ground

The principle of end-to-end encryption underpins a system of communication where only the communicating users can read the messages. To this end, it exists to prevent any …

person
The impact of the CCPA on companies’ privacy practices

A new DataGrail report examined how millions of California consumers are exercising their privacy rights – to access their data, delete their data, and stop the sale of …

tax season
Death, taxes, and hacks: How to prevent cyberattacks during tax season

Remember how folks did taxes in the olden days? They’d collect large piles of paper documents, fill out endless pages of forms, stuff a bunch of receipts in a shoebox and – …

NIST cryptographic system
Encrypted method that measures encounters could slow down or prevent future pandemics

When you bump into someone in the workplace or at your local coffee shop, you might call that an “encounter.” That’s the scientific term for it, too. As part …

user
3 steps to meeting data privacy regulation compliance through identity programs

Cybersecurity is undeniably a business-critical function. That’s only been reinforced over the past few months by the SolarWinds and Exchange attacks. Consequently, a recent …

fill online form
93% of consumers concerned about data security when filling out online forms

Source Defense provides in-depth analysis of the client-side threat landscape and specific attacks like formjacking, Magecart and web browser threats. The research offers a …

Tor Project
How to get affordable DV certificates for onion sites

The Tor Project, the nonprofit developers of the Tor network and Tor Browser, have announced two exciting developments for onion services: affordable DV certificates for v3 …

fist
What businesses need to know to evaluate partner cyber resilience

Many recent high-profile breaches have underscored two important cybersecurity lessons: the need for increased scrutiny in evaluating access and controls of partners handling …

Cybersecurity risk management
Risk management in the digital world: How different is it?

Managing risk arising from remote work has largely been reactive, and risk managers have had to adapt to new digital threats that weren’t necessarily as prevalent when work …

face
Why data privacy will be the catalyst for digital identity adoption

Most of us probably don’t think of buying a bottle of wine as a security risk. However, we inadvertently give away our address, surname, nationality and signature – …

face
Can private data be recovered from “sanitized” images?

Machine learning systems are becoming pervasive not only in technologies affecting our day-to-day lives, but also in those observing them, including face expression …

Don't miss

Cybersecurity news