Please turn on your JavaScript for this page to function normally.
Privacy Shield
Researchers create tool for protecting children’s online privacy

A University of Texas at Dallas study of 100 mobile apps for kids found that 72 violated a federal law aimed at protecting children’s online privacy. Dr. Kanad Basu, …

Magento
Magento 1 reaches EOL: Merchants urged to upgrade or risk breaches, falling out of PCI DSS compliance

When Adobe released security updates for Magento last week, it warned that the Magento 1.x branch is reaching end-of-life (EOL) and support (EOS) on June 30, 2020, and that …

Qualys VMDR
Review: Qualys VMDR

It’s 2020 and the importance of vulnerability management should go without saying. In fact, knowing your assets and performing continuous vulnerability management are two of …

GDPR
Does analyzing employee emails run afoul of the GDPR?

A desire to remain compliant with the European Union’s General Data Protection Regulation (GDPR) and other privacy laws has made HR leaders wary of any new technology that …

Snyk
New vulnerabilities in open source packages down 20% compared to last year

New vulnerabilities in open source packages were down 20% compared to last year suggesting security of open source packages and containers are heading in a positive direction, …

MacBook Pro
Massive complexity endangers enterprise endpoint environments

There’s a massive amount of complexity plaguing today’s enterprise endpoint environments. The number of agents piling up on enterprise endpoint devices – up on average – …

comment
80% of consumers trust a review platform more if it displays fake reviews

Many people are using COVID-19 quarantine to get projects done at home, meaning plenty of online shopping for tools and supplies. But do you buy blind? Research shows 97% of …

5G
Despite COVID-19, 5G progress in connections and deployments continues

5G progress in connections and deployments continues despite the COVID-19 pandemic and resulting economic downturn according to 5G Americas. According to data from Omdia, …

Person
Week in review: The economics of security research, SOC teams battle with burnout

Here’s an overview of some of last week’s most interesting news and articles: SOC team members battle with burnout, overload and chaos While some organizations …

money
Cybercriminals are using IM platforms as marketplaces

Cybercriminals are increasingly using IM platforms like Telegram, Discord, Jabber, WhatsApp, IRC and others to advertise and sell their goods and services, IntSight …

search
Marred by garbage: Striking a balance for security data

Security applications are subject to the age-old computing axiom of “garbage in, garbage out.” To work effectively, they need the right data. Too much irrelevant data may …

remote work
With remote working on the rise, infosec strategies need to evolve

The recent pandemic created a new normal that redefines the way business operates by eliminating security and physical work borders. An Avertium study found that having …

Don't miss

Cybersecurity news