Important tips for safe online shopping post COVID-19 - Online shopping can be convenient, especially during a total lockdown. But shopping online in the middle of the COVID-19 crisis brings with it other dangers. Here's what to watch out for.
Windows 7 is EOL: What next? - Windows 7 is EOL, meaning it's reached the end of its lifecycle. It's time to move on to a more secure OS—but that doesn't mean you no longer need security software.
Child identity theft, part 2: How to reclaim your child’s identity - In part 2 of our series on child identity theft, we examine the signs their PII might be compromised and how to reclaim your child's identity if it is. We also list ways to protect their data and ID in the future.
The effects of climate change on cybersecurity - We explore the relationship between climate change and cybersecurity, two of the major issues of our time. Does cybersecurity actually contribute to global warming? Or can climate change illicit an uptick in cybercrime? We take a look.
Technology and the power of moral panic - We look at how technology and a splash of moral panic have made for strange companions down the years.
Child identity theft, part 1: On familiar fraud - In this two-part series on child identity theft, we shed light on the growing problem of familiar fraud, where those entrusted with a minor's information are the very ones who abuse it.
Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack - We take a look at some of the most famous (or infamous) hacking scenes from TV and movies and the cybersecurity lessons, if any, we can learn from them.
A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s - As the 2010s come to a close, we take a snarky walk down memory lane, listing the craziest, most impactful, or simply just awful cybersecurity fails of the decade.
Report: Organizations remain vulnerable to increasing insider threats - The risk and challenges insider threats pose to organizations are ever present, even before tech as we know it existed. The age of digitization only made it higher and far-reaching. How has insider threats evolved over time? Where are we now in terms of mitigating insider threat risk? Are businesses really doing something about it? We answer such questions—and more—in this post.

Select your language