Explained: cloud-delivered security

What is cloud delivered security aka security as a service? Is it something that can benefit your organization? There’s a good chance that it might.

Read more

Cloud data protection: how to secure what you store in the cloud

With robust security measures and a healthy dose of general internet safety guidelines, cloud storage can be as secure as any other option on the market.

Read more

Explained: the strengths and weaknesses of the Zero Trust model

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Read more

Explained: edge computing

What is edge computing? And how will this fledgling technology change the way we create, consume, share, and store data? We tackle the technical considerations and security implications for delivering data to the edge.

Read more

Explained: What is containerization?

Containerization is gaining traction as a method to improve consistency, portability, and scalability without the investments required for virtualization. But is it secure?

Read more

Can we trust our online project management tools?

Online project management tools can be not only useful, but a lifeline for developers and PMs who juggle multiple tasks with competing deadlines. How can we use them in a secure way?

Read more

Explained: the cloud

The cloud. What is it? What are the pros and cons, and how can we make it as safe as possible? This post covers the basics.

Read more

Insider threats in your work inbox

A new phishing campaign that targets businesses goes beyond business email compromise or CEO fraud.

Read more

Solution Corner: Malwarebytes Incident Response

We recently announced Malwarebytes Incident Response, a centralized threat detection and remediation platform that helps businesses accelerate their response workflows for these types of threats while reducing attack dwell times. Malwarebytes Incident Response scans networked endpoints for advanced threats including malware, PUPs, and adware, and removes them.

Read more

Press H to Hack: Earth Defense Force needs defending

Video games! They’re great, except when they’re not. And in this case, a very good game is giving players some very bad experiences in the realm of “all my data is ruined”. Gaming cheats cause problems for those wanting to keep their save games free from harm. We take a look at the issue, and show how to avoid getting caught up in a spot of save game ruination.

Read more

Select your language