Browsing Category
Cybersecurity
Responding To High-Level Cyberattacks on A Mid-Level Budget
By Jesper Zerlang, CEO, LogPoint
Protecting your business against threat actors is no small task. Not only has the number of…
Transparency And Collaboration Between Vendors and Customers Are Key to…
By Nick Sorensen, CEO of Whistic, Inc.
It’s no secret the number of third-party security incidents continues to rise…
Defend Your Castle with Zero Trust
Protecting yourself, your company and your data from the vulnerabilities of connectivity is no longer an option, but an…
Microsoft Addresses Wi-Fi Hotspots Issues in Latest Update
Microsoft added a new known issue affecting its operating systems’ Wi-Fi hotspot feature to its official Health Dashboard page.…
US Man Sentenced to Nine Years in Prison for Hacking iCloud Accounts and…
A California man was sentenced to time in prison Wednesday after hacking thousands of iCloud accounts, stealing people’s nude…
WordPress Updates More Than a Million Sites to Fix Critical Ninja Forms…
Content management system (CMS) provider WordPress has forcibly updated over a million sites to patch a critical vulnerability…
Experts Discuss Next Steps in Trust, Privacy and Security
The complex interplay between trust, privacy and cybersecurity was discussed by a panel of experts during a session at the Okta…
UK Proposes Post-Brexit Data Laws to Boost Innovation
The UK government has proposed new data laws designed to boost economic growth and innovation, in addition to plans to clamp down…
Cybersecurity Researchers Find Several Google Play Store Apps Stealing…
A group of cybersecurity researchers from Dr. Web claims to have spotted a number of apps on the Google Play Store in May with…
ONLINE STREAMING- A Harmless Entertainment or a Cybersecurity Hazard
By Shigraf Aijaz, Cybersecurity Journalist and Writer, Be Encrypted
The popularity of online streaming has grown…