A week in security (August 31 – September 6)

A round up of the previous week’s most interesting security news and happenings.

Read more

The impact of COVID-19 on healthcare cybersecurity

COVID-19 has put incredible pressure on the healthcare sector. How did the pandemic impact healthcare cybersecurity?

Read more

A week in security (July 6 – 12)

A roundup of cybersecurity news from July 6 – 12, including a look at pre-installed malware on some Android phones, and a Mac malware mystery.

Read more

MSPs, know what you’re really looking for in an RMM platform

When ransomware targeting MSPs began making headlines, things started to change. This also made MSPs assess their current RMM platform and, should they decide to switch, change the criteria of what to look out for when finding “the right” vendor. We have 5 considerations for you.

Read more

Teaching from home might become part of every teachers’ job description

Teaching from home may soon become a part of the new normal. What do teachers have to keep in mind to pull it off? Privacy, data protection, and security.

Read more

Security tips for working from home (WFH)

Many people are working from home as part of a global social distancing effort to avoid spreading the coronavirus. Learn how to stay secure (plus a couple tips for staying sane) while WFH.

Read more

A week in security (March 2 – 8)

A roundup of the previous week’s security headlines, including the introduction of a new series on child identity theft, an examination of law enforcement’s cybersecurity woes, a progress check on our stalkerware initiative, and more coronavirus scammers on the prowl.

Read more

Lock and Code S1Ep1: On RSA, the human element, and the week in security

We look at all the interesting security news from last week’s RSA Conference and beyond, plus present the first episode of our brand-new podcast: Lock and Code.

Read more

Explained: the strengths and weaknesses of the Zero Trust model

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Read more

Explained: edge computing

What is edge computing? And how will this fledgling technology change the way we create, consume, share, and store data? We tackle the technical considerations and security implications for delivering data to the edge.

Read more

Select your language