CybersecurityData Security

by

Chromium’s WebRTC Zero-Day was Just the Tip of the Iceberg

Enterprises need to strengthen their stance at the cybersecurity frontlines. Read on to learn more about smarter vulnerability management. The post...

Read More →

AutomationCybersecurity

by

Life After the Tech Apocalypse: Predictions for Tech in 2023

After the tech apocalypse of 2022, here are predictions for a more tech-forward 2023. The post Life After the Tech Apocalypse: Predictions for Tech in 2023...

Read More →

Cybersecurity

by

Information Stealing and Digital Extortion: Why Criminals Attack for Future Use

How can organizations protect themselves against sensitive information breaches and digital extortion? The post Information Stealing and Digital Extortion: Why...

Read More →

CybersecurityPhishing

by

Bring the Browser in from the Cold: Old Threat Vectors Demand New Defenses

How to manage browser vulnerabilities in a remote-work setting with growing threats. The post Bring the Browser in from the Cold: Old Threat Vectors Demand New...

Read More →

Cybersecurity

by

Why Pentesting Is Now a Necessity — and How To Leverage it Effectively

Here’s a look at why pen tests are now a priority, how this process works, and what companies can do to make the most of their pentesting efforts. The post...

Read More →

Aberdeen Strategy & ResearchCybersecurity

by

EDR & MFA Solutions: A Must-Have for Cyber Insurance Companies

Here’s why cyber insurance underwriters are increasingly focusing on EDR and MFA solutions for cyber loss prevention and IT risk management. The post EDR...

Read More →

Cybersecurity

by

The Next Steps in Robocall Mitigation

How to fight the security risks that robocalls bring. The post The Next Steps in Robocall Mitigation appeared first on ....

Read More →

Artificial IntelligenceCybersecurity

by

Cybercriminals are Discussing How to Bypass ChatGPT Safeguards

Checkpoint researchers came across discussions seeking ways to see if ChatGPT payment, location and other API restrictions could be bypassed. The post...

Read More →

Cybersecurity

by

Microsoft Releases a High January Patchload for the Second Year

The January 2023 Patch Tuesday also marks the end of support for Windows 7, Windows 8.1 and Windows RT 8.1. The post Microsoft Releases a High January...

Read More →

Cybersecurity

by

From Increased Email Threats To More Regulation: What Does The Security Horizon Hold?

What are the latest threats and trends in the security industry? The post From Increased Email Threats To More Regulation: What Does The Security Horizon Hold?...

Read More →

CybersecurityData Security

by

The Value of Cloud-based Analytics: How Understanding Your Data Helps Keep It Secure

Here’s why and how cloud-based analysis tools can help improve data security. The post The Value of Cloud-based Analytics: How Understanding Your Data Helps...

Read More →

Cybersecurity

by

Qualcomm and Lenovo Fix High Severity UEFI Vulnerabilities in Chipsets

Vulnerable devices include Microsoft Surface, Lenovo ThinkPad, and Samsung, and Windows Dev Kit 2023. The post Qualcomm and Lenovo Fix High Severity UEFI...

Read More →

Close Search Window
Close