Please turn on your JavaScript for this page to function normally.
tax season
Death, taxes, and hacks: How to prevent cyberattacks during tax season

Remember how folks did taxes in the olden days? They’d collect large piles of paper documents, fill out endless pages of forms, stuff a bunch of receipts in a shoebox and – …

risk
5 key cybersecurity risks in 2021, and how to address them now

With an unexpected year of massive change behind us, many organizations have now an extensive remote workforce, new technologies in use, and digital transformation under way …

captcha
Want to get around a CAPTCHA? That’ll be 0.00094c, please

Shopping or booking an appointment online can seem increasingly like busywork. Please prove that you’re not a bot: select all the photos that show traffic lights. Do some …

CI/CD pipelines
The growing threat to CI/CD pipelines

Before the pandemic, most modern organizations had recognized the need to innovate to support developers’ evolving workflows. Today, rapid digitalization has placed a …

user
3 steps to meeting data privacy regulation compliance through identity programs

Cybersecurity is undeniably a business-critical function. That’s only been reinforced over the past few months by the SolarWinds and Exchange attacks. Consequently, a recent …

keyboard
Digital dependence and innovation: Two critical trends in cyber espionage and crime

Being a veteran cybersecurity incident responder with over 21 years of field experience I know I will always have a job and it will always be interesting. In the evolution of …

arrows
Organizations suffer downtime despite following cybersecurity recommendations

Organizations continue to suffer downtime despite IT stacks equipped with all recommended cybersecurity technologies – including continuous data protection, anti-malware with …

zero
How to avoid 4 common zero trust traps (including one that could cost you your job)

Formulated by a research analyst over a decade ago, the zero-trust security model was embraced by thought leaders. And when Google, with its unlimited budget and resources, …

identity theft
Stop using your employees as scapegoats: Change their behavior

Remote workforces pose new challenges for organizations, with the largest issue centered around fortifying the security of at-home workers. We’ve recently witnessed large …

shield
Why certificate automation is no longer just “nice to have”

We’ve all heard the shocking stories about the outages at what should have been bullet-proof organizations like Microsoft, Spotify, and a California Covid-19 testing …

network
Using memory encryption in web applications to help reduce the risk of Spectre attacks

There’s nothing quite like an actual proof-of-concept to make everyone listen. I was pleased by the PoC released by Google security engineers Stephen Röttger and Artur Janc …

remote workforce protection
Hidden areas of security and the future of hybrid working

The pandemic has changed how many companies operate in a short period of time. Over the last year we’ve witnessed most organizations with office-based workforces having to …

Don't miss

Cybersecurity news