WPA3 is here. You'd better start planning for a new network kit.
What would you do if you had a saboteur? How would you know?
Here's why random key generation is necessary and how to measure if you are doing this well enough.
Don't just hide behind the "not a bug" reply. Protect your cloud customers!
It’s time to get ahead of the next tranche of regulations, but beware of lawyers playing it safe.
IT is predictably unpredictable, so whether or not blockchain will live up to the hype is anyone’s guess.
What other ancient software layers do you rely on? And to the security researchers: Enough with the hyperbole, already.
Previous attempts at password replacements have failed. Be cautious of dancing on the bleeding edge.
Should you enforce #DeleteFacebook on your users’ phones?
It's become an industry-standard form of data collection for years. But the news cycle has a way of catching up when you least expect it.

Pages