Can you trust any browser extensions? IT shops might want to consider extension blocking as a policy.
This one's a call-to-action: Urgently review cloud-storage policies, IAM, ACLs, etc. And audit any data-sharing partnerships.
Only data-centric security protects against the most serious threats. Here's why you should use it.
Data masking can solve your compliance headaches and ensure safe software delivery. Here's how it's done.
The KRACK Wi-Fi exploit can create serious problems for any WPA2-enabled network. Here's how to protect yourself.
It's a relatively simple matter to protect yourself in the coming age of quantum computing. Here's how to be secure.
You don’t need to be a government to take ROCA seriously. Make sure you’re not relying on a keygen that’s been broken since 2008.
Here's how to use DevSecOps practices to kill the zero day.
Personal mobile devices are a security minefield. What your organization can learn from this high-profile White House iPhone faux pas.
Ty Sbano offers up uncommon lessons on implementing bug bounties. Here are three quick tips for getting it right in a DevOps shop.

Pages