Should you enforce #DeleteFacebook on your users’ phones?
It's become an industry-standard form of data collection for years. But the news cycle has a way of catching up when you least expect it.
Can you trust any browser extensions? IT shops might want to consider extension blocking as a policy.
This one's a call-to-action: Urgently review cloud-storage policies, IAM, ACLs, etc. And audit any data-sharing partnerships.
Only data-centric security protects against the most serious threats. Here's why you should use it.
Data masking can solve your compliance headaches and ensure safe software delivery. Here's how it's done.
The KRACK Wi-Fi exploit can create serious problems for any WPA2-enabled network. Here's how to protect yourself.
It's a relatively simple matter to protect yourself in the coming age of quantum computing. Here's how to be secure.
You don’t need to be a government to take ROCA seriously. Make sure you’re not relying on a keygen that’s been broken since 2008.
Here's how to use DevSecOps practices to kill the zero day.