IoT bills and guidelines: a global response

IoT laws and guidelines abound, as we take a look what’s happening around the world in the name of securing Internet-connected devices.

Read more

A week in security (October 28 – November 3)

A roundup of the latest cybersecurity news for the week of October 28 – November 3, including cyberattacks against SMBs, the Internet’s 50th birthday, stalkerware, donation scams, and more.

Read more

As Internet turns 50, more risks and possibilities emerge

The world as we know it changed on October 29, 1969, the day the Internet was born. 50 years later, it’s both ubiquitous and full of potential—and risks.

Read more

How 5G could impact cybersecurity strategy

With 5G wireless on the horizon, what will businesses need to do to secure their devices and networks?

Read more

A week in security (February 4 – 8)

A roundup of security news from February 4 – 8, including Facebook’s secure messaging integration, Google’s changes to URLs, a scam involving the Kindle store and John Wick, and more.

Read more

How to browse the Internet safely at work

This Safer Internet Day, we’re presenting a guideline to employees on how to navigate the online trenches safely, whether they’re on their desktop computers, company-owned laptops, or mobile devices. Who wants to be the one responsible for a breach? No one.

Read more

TLS 1.3 is nearly here

TLS 1.3 is nearly upon us, and with it comes a more secure way to do business online. We look at some of the changes coming into force soon.

Read more

IPv6, it’s waiting for you

How does IPv6 compare to IPv4, and what do we need to do make a safe transition?

Read more

Microsoft Has Taken Up the Mantle Against Revenge Porn

“Microsoft will remove links to photos and videos from search results in Bing”, says Chief Online Safety Officer.

Read more

CTA: New Java Vulnerability

URGENT: Despite a recent critical patch to Java SE, Polish security firm Security Explorations released details of yet another Java vulnerability.  Adam Gowdiak, a researcher from the firm provides a full disclosure of the exploit here.

Read more

Select your language