- Welcome Guest
- Sign In
Most contractors the Department of Defense hired in the last five years failed to meet the required minimum cybersecurity standards, posing a significant risk to U.S. national security.
Although small businesses lack the resources large enterprises enjoy to defend themselves online, SMBs can avoid becoming cybercrime victims by following these proven, safe computing practices.
Streaming video content from non-mainstream providers might make you an unwitting target of content piracy. If you get a bargain pricing offer, you risk becoming the victim of scammers and hackers, losing personal data, and having your financial assets stolen.
The 2022 edition of Mozilla’s Privacy Not Included buyer’s guide has privacy reviews of more than 75 popular consumer electronics gifts.
In the coming year, lawmakers will be paying increased attention to workplace monitoring, and whistleblowers may also be demanding monitoring information to support complaints about labor law violations, according to the predictions put together by 10 Forrester analysts.
A recent report highlights the staggering growth of ATO fraud online. In the U.S. alone, around 24 million households have fallen victim to this form of fraud. Social media is one of the driving forces behind the issue, with more than half of all ATOs related to a social media account.
In a survey of consumers, the Identity Theft Resource Center found that 85% had their Instagram accounts compromised, while 25% had their Facebook account hijacked.
Sens. Gary Peters, D-Mich., and Rob Portman, R-Ohio, introduced the legislation that seeks to address open source software risks in government. The proposed Bill, S. 4913, now awaits action by the Committee on Homeland Security and Governmental Affairs.
Cloudflare's Zero Trust SIM is designed to secure every packet of data leaving a mobile device. After it’s installed, the ZT SIM sends network traffic from the device to Cloudflare’s cloud where its Zero Trust security policies can be applied to the data.
Data privacy laws are becoming a major focus worldwide as businesses hasten to meet new compliance obligations. Many organizations involved with international commerce must alter their procedures to comply with new legislation.
Cybersecurity threat intelligence provider Cybersixgill has a new solution to reduce cyber risk by accelerating companies’ time to respond. It delivers what could be the cybersecurity industry’s first end-to-end intelligence tool to combat the CVE lifecycle.
The escalating use of e-commerce creates a feeding frenzy for fraudsters. Find out how online buyers and sellers can avoid today's most common scams, and who is most susceptible.
In today’s world, security isn’t something that businesses can overlook, neglect, or simply outsource. It’s time for founders to step up and start taking ownership of their company’s security.
Nearly all the top 10 universities in the United States, United Kingdom, and Australia are putting their students, faculty and staff at risk of email compromise by failing to block attackers from spoofing the schools’ email domains.
Social Media
See all Social Media