Please turn on your JavaScript for this page to function normally.
phishing
Who gets spear phished, and why?

The story of nearly every notable data breach in recent memory begins in pretty much the same way: Once upon a time, someone got spear phished… Whether it’s a government …

lock
French cybersecurity agency open sources security hardened CLIP OS

After developing it internally for over 10 years, the National Cybersecurity Agency of France (ANSSI) has decided to open source CLIP OS, a Linux-based operating system …

IoT security
IT security teams are being locked out of IoT projects

Trend Micro revealed that organizations around the world are exposing themselves to unnecessary cyber risk by failing to give IT security teams a voice when planning IoT …

G Suite
G Suite users get a better view of their enterprise security posture

Google is rolling out a new security tool for G Suite Enterprise users: the Security Center. The tool aims to give administrators a better understanding of their …

connected house
90% of consumers think security should be built into smart devices

90% of consumers polled from Brazil, China, Germany, India, UK and US believe it is important that a connected device has security built into the product, digital platform …

Google security
Google introduces new protections to prevent app-based account compromise

Google has implemented new protections that should considerably reduce the risk of potentially malicious apps gaining control of users’ Google account. There can be no …

attack
Attack types companies expect to encounter in 2017

What are the key attack types expected to cause the biggest security problems in 2017 and how successful will businesses be at defending against them? Tripwire and Dimensional …

Don't miss

Cybersecurity news