November 6, 2019Security The Edge Cartoon Contest: Need a Lift? Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift […]
November 6, 2019Security Disclosure Does Little to Dissuade Cyber Spies In the past, outing nation-state cyber espionage groups caused a few to close up shop, but nowadays actors are more likely to […]
November 6, 2019Security 10 Tips for Building Compliance by Design into Cloud Architecture A pair of experts pass along lessons learned while building out the team and processes necessary to support Starbucks’ mobile app. ——– […]
November 6, 2019Security The State of Email Security and Protection Phishing and ransomware top the list of security risks that organizations are not fully prepared to deal with. ——– Free High Security […]
November 6, 2019Security Proofpoint Acquires ObserveIT to Bolster DLP Capabilities The $225 million acquisition will help Proofpoint expand its data loss prevention capabilities with email, CASB, and data at rest. ——– Free […]
November 6, 2019Security Enterprise Web Security: Risky Business Web development is at much more risk than commonly perceived. As attackers eye the enterprise, third-party code provides an easy way in. […]
November 6, 2019Security Android keyboard app caught red‑handed trying to make sneaky purchases The virtual keyboard app ai.type, which has racked up 40 million downloads, has been found to sign up users to premium services […]
November 6, 2019Security Five ways to strengthen employee cybersecurity awareness How can organizations foster a workplace environment that enables employees to acquire the skills needed to keep cyber-threats at bay? The post […]
November 5, 2019Security Apple developers – get this update to protect the rest of us! Know any Apple developers? Make sure they’re signed up to Apple’s security advisories, and getting their developer updates. ——– Free High Security […]
November 5, 2019Security Russia’s sovereign internet law comes into force The new law compels the country’s ISPs to forward all data arriving and departing from their networks through special gateway servers. ——– […]