Expert corner

 
 
Prepare Your Business for DDoS Attacks Before It's Too Late
mobile

BYOD: How to provide secure access to network resources

IT organizations have little or no choice when it comes to Bring Your Own Device (BYOD) programs. Employees want to access the network with their personally owned devices, and in today’s landscape where employers compete for skilled employees, …

broken

Security startup confessions: Customer breach disclosure

My name is Kai Roer and I am a co-founder of European security startup CLTRe, and these are my confessions. I hope you will learn from my struggles, and appreciate the choices startups make when security matters. I will share experiences from my …

email

Most email authentication implementations fail

Most of the world’s largest businesses fail at attempts to use open industry standards to control which email is sent using their names. Three quarters of large businesses attempting implementation of the DMARC email authentication …

 
 

Don't miss

Malware news

Privacy news

 
 
Prepare Your Business for DDoS Attacks Before It's Too Late