Google employees have successfully dodged phishing attempts for over a year thanks security keys and two-factor authentication.
- By Sydny Shepard
- Jul 25, 2018
Spear phishing is a targeted type of phishing in which the scammer already knows some information about the victim.
Global research company CrowdStrike surveyed over a thousand IT decision-makers and found companies awarness to combat supply chain attacks.
- By Sydny Shepard
- Jul 23, 2018
The question is this: How can healthcare organizations protect themselves against threats when most originate from within their own walls?
- By Hoala Greevy
- Jul 20, 2018
Millions of personal data records are vulnerable after a breach was detected at LabCorp.
- By Sydny Shepard
- Jul 19, 2018
IBM Security and Ponemon Institute have released their study on the average cost of a data breach.
- By Sydny Shepard
- Jul 17, 2018
Even if you don’t have a Facebook account, you have undoubtedly heard the reports about how Cambridge Analytica accessed the personally identifiable information (PII) of up to 87 million users over a period of several years.
- By Christian Morin
- Jul 11, 2018
As with all major sporting and entertainment events, the goal is for everyone using a ticket to have purchased it from the authorized ticketing entity and to have a seamless experience both when they pick it up and when they present it at the venue.
- By Cesare Paciello
- Jul 11, 2018
Our goal of clustering attacks on web applications is two-fold
- By Gilad Yehudai
- Jul 11, 2018
Timehop disclosed a security breach that has compromised the personal data, including names and emails, of its 21 million users
- By Sydny Shepard
- Jul 10, 2018
Information Security it is one of the most in demand skill sets in all the technology industry.
- By Anthony Coggine
- Jul 06, 2018
This new AI could present new challenges as well as opportunities
- By Harold Kilpatrick
- Jun 29, 2018
\Wi-Fi Alliance is looking to beef up security with an updated protocol
- By Sydny Shepard
- Jun 27, 2018
Google has announced it has overhauled it's privacy and security settings service
- By Sydny Shepard
- Jun 26, 2018
What business should do to protect against APTs
- By Brad Thies
- Jun 25, 2018
Insight into how digital learning technology will shape schools in the future
The reputation of the “Dark Web” perhaps exceeds its reality
Make secure transactions with the best VPN service
Kicking off a cloud-first strategy without considering security measures can cloud your judgement
- By Robert Huber
- Jun 19, 2018
This online 90-minute training is designed to educate startup companies and social media companies about how terrorists may seek to exploit their platforms.