5 min read - Password managers are desperately imperfect, but they’re the least-worst option. Beware of babies hiding in bathwater.
5 min read - Choose people-first. Choose privacy-first. Reject Google’s opaque shenanigans.
6 min read - Guido van Rossum can’t believe you’ve not upgraded already. How sure are you that you have no Python 2 code running?
5 min read - Consider banning or restricting use of classic-Bluetooth devices in your organization.
6 min read - Don't make the mistake of putting all your trust in AI to secure your systems. Take these lessons from the BlackBerry Cylance hack to heart.
6 min read - Your users are picking up spare cables in conference rooms, or buying generic cables on Amazon. Think about that for a moment—now panic.
5 min read - Cloud-native zero-trust is shining a light on the path out of a cybersecurity quagmire. Here are emerging best practices from Black Hat.
5 min read - Insider threats come in many forms. How bribable are your employees?
7 min read - Never mind your wallet—what’s in your WAF ruleset?
Security Blogwatch wallet image
5 min read - Here's an approach to securing the cloud infrastructure layer that companies should adopt ASAP.

Pages