Explained: edge computing

What is edge computing? And how will this fledgling technology change the way we create, consume, share, and store data? We tackle the technical considerations and security implications for delivering data to the edge.

Read more

Explained: What is containerization?

Containerization is gaining traction as a method to improve consistency, portability, and scalability without the investments required for virtualization. But is it secure?

Read more

A week in security (November 11 – 17)

A roundup of cybersecurity news from November 11 – 17, including Facebook scams, the importance of securing food infrastructure, and our latest CTNT report.

Read more

Cybersecurity for journalists: How to defeat threat actors and defend freedom of the press

When it comes to cybersecurity, journalists need to protect themselves, their sources, and the freedom of the press. Which methods should they use?

Read more

A week in security (October 7 – 13)

A look at the cybersecurity news from October 7 – 13, including updates on war shipping, managed service providers, and stalkerware.

Read more

Securing the managed service provider (MSP)

Managed service providers (MSPs) have become the target of attacks, as lack of aggressive security posturing has left them—and the high-value data of their clients—vulnerable. Learn how MSPs can secure against a rising tide of threats.

Read more

How security orchestration improves detection and response

Security orchestration is a regulator that makes sure security solutions, often from different vendors, work well together to automate response and keep organizations safe.

Read more

Data and device security for domestic abuse survivors

Many domestic abuse survivors need help before stalkerware strikes. Here, we give basic advice on device security and protecting sensitive data.

Read more

Mobile Menace Monday: Dark Android Q rises

The Android Q operating system is being developed with privacy and security in mind. We take a look at both, examining new features intended for giving users better control of their devices and data.

Read more

A week in security (April 8 – 14)

A roundup of news stories from April 8–14, including Baldr, medical management apps, an Android password stealer, and new sextortion scams.

Read more

Select your language