
Australia plans to mandate file scanning for all tech companies
In an effort to target online child sexual abuse and pro-terror content, Australia may cause global changes in how tech companies handle data.
You're on page 18, See the latest articles on Security.
In an effort to target online child sexual abuse and pro-terror content, Australia may cause global changes in how tech companies handle data.
Okta’s formula for multi-device identity authentication for a hybrid workforce: extract passwords, add ease of use across devices.
Practices such as using a separate email for sensitive activities and removing personal data from people search sites can help executives improve their data privacy.
Threat intelligence firm Abnormal Security is seeing cybercriminals using generative AI to go phishing; the same technology is part of the defense.
The study shows attackers are using more bots and doing more sophisticated phishing exploits and server attacks, especially targeting retail.
FBI, CISA and international organizations released an advisory detailing breadth and depth of LockBit, and how to defend against the most prevalent ransomware of 2022 and (so far) 2023.
Read the technical details about a new AiTM phishing attack combined with a BEC campaign as revealed by Microsoft, and learn how to mitigate this threat.
A poll of security software buyers shows 39% of small and medium-sized businesses lost customer data due to cyberattacks.
The assumptions a business shouldn’t make about its DDoS defenses and the steps it should take now to reduce its likelihood of attack.
Google’s ChromeOS is for Chromebook users. But Thomas Riedl, the Google unit’s head of enterprise, sees big growth opportunities for the OS — and Chromebook — where security and versatility matter most.
A new study polling software buyers at businesses worldwide finds strong intention to increase budget, with special interest in AI. It also looks at how vendors can engage buyers.
Get the details about the ransomware group Clop's ultimatum to companies they recently hit with a supply-chain attack. Also, learn cybersecurity mitigation best practices for any organization.
This is a comparison of Duo and Microsoft Authenticator. Learn more about their key differences, features, security, and performance in this in-depth analysis.
At its annual customer event in Las Vegas, Cisco introduced AI-powered, cloud-based products that are designed to snap into its new Security Cloud platform like LEGO.
A recent report from Kaspersky revealed a zero-click attack method that requires no action from victims to infect iOS devices.