Regulation readiness: Embracing the privacy legislation wave ahead
There are a few certainties in life. Your attempt to use the fifteen-item express checkout line with sixteen items will be denied by the seventeen-year-old cashier. The …
Executives now recognize cybersecurity as a key business driver
Cybersecurity is now recognized as a key business driver by the C-Suite, according to a new Radware report. Executives that participated in the survey found that the four main …
Slack + Snapchat = AppSec? Breaking down the complexity of messaging apps
Recently messaging applications got hit hard with vulnerabilities, hacking attempt disclosures by nation-states and insider employee inappropriate behaviors. As organizations …
Insecure password memory aids: A passwordless future could be the solution
There is a readiness for passwordless security methods such as biometrics, with 70% workers believing biometrics would benefit the workplace, according to Okta. The …
Organizations more likely to accelerate business when protecting their cloud data
Cloud services are the most significant advance in IT since the introduction of the internet itself, and most organizations today benefit from the collaboration, scalability …
GSMA disproves false claims 5G systems will harm other services
The mobile industry has already demonstrated within leading international standards bodies that 5G can be used safely alongside other services, including weather sensing …
SACK TCP flaws can crash, slow down Linux-based systems
An engineering manager at Netflix has unearthed several TCP networking vulnerabilities in Linux and FreeBSD kernels that could lead to systems crashing or consuming too many …
Vulnerable TP-Link Wi-Fi extenders open to attack, patch now!
Several TP-Link Wi-Fi extender devices sport a critical remote code execution vulnerability that could allow attackers to take over the devices and command them with the same …
Why phishing education has never been more critical to your business
Our cyber defenses are becoming stronger and stronger every year. Even the smallest companies can now deploy advanced anti-malware and intrusion detections tools that were, …
One year of GDPR application: Europeans well aware of their digital rights
Europeans are relatively well aware of the new data protection rules, their rights and the existence of national data protection authorities, to whom they can turn for help …
Researchers develop app to detect Twitter bots in any language
Thanks to fruitful collaboration between language scholars and machine learning specialists, a new application that can detect Twitter bots independent of the language used …
How employees and their organizations are prioritizing data privacy
Employees in the UK expressed greater understanding of privacy laws, and better training opportunities, than those in the U.S., the ObserveIT survey reveals. The survey polled …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring