My precious: security, privacy, and smart jewelry

Fashionable and functional. These are the makings of smart jewelry. They aren’t secure, yet some are used to secure user data and online accounts. Should you still buy one?

Read more

Official Cardi B website plagued by spammers

Over the past few days, fans of singer Cardi B noticed her website was slowly filling up with spam. We take a look at what happened.

Read more

A week in security (May 14 – May 20)

A roundup of security news from May 14 – May 20, including Mac malware, machine learning, advergaming, tech support scams, and much more.

Read more

GDPR causes a flood of new policies

The upcoming GDPR deadline means you’ve probably seen an influx of changed policy announcements in your inbox. Here’s why you might want to pay attention to the changes.

Read more

A week in security (April 23 – April 29)

A roundup of security news from April 23 – April 29, including worms, GDPR, DDoS markets, and more.

Read more

Building an incident response program: creating the framework

An incident response plan does not need to be overly complicated. However, having a solid and tested framework for the program is key in the ability of an organization to respond to and survive a security incident.

Read more

A week in security (February 19 – February 25)

A roundup of notable news stories from February 19–25, including drive-by download attacks on Chinese websites, Deepfakes programs being paired with cryptominers, and a review of GDPR guidelines.

Read more

How to build an incident response program: GDPR guidelines

With the General Data Protection Regulation (GDPR) going into effect this May, many organizations need to have a robust incident response program to ensure the safety of their customers’ and employees’ data. Here’s part one of our guidelines.

Read more

Make way for the GDPR: Is your business ready?

On May 25th, 2018, the EU General Data Protection Regulation (GDPR) will come into full force. Although this law applies to data controllers and data processors within the European Union, SMEs in the US and other countries that handle online data of Europe and UK citizens are affected by this as well. Thus, there is a need for companies to comply. Where should B2Cs and B2Bs start? Read through our comprehensive guide here.

Read more

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language