Please turn on your JavaScript for this page to function normally.
code
Four common API vulnerabilities and how to prevent them

Proper security measures are one of the most important aspects of building an application programming interface, or API. It’s great for an API to connect systems and give …

crowd
Consumers still happy to exchange data with businesses if there’s a benefit

Data privacy is the subject of much debate and discussion in the media. There has also been much speculation about the effects of recent changes to data privacy legislation …

glasses
Are privacy and personal identity impossible to protect?

While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t …

cloud
The benefits of mature cloud security strategies

Organizations that take a pragmatic approach to securing the use of user- and business-unit-led-cloud services realize appreciable business benefits compared with …

businessman
Cybersecurity remains non-core competency for most C-suite executives

In today’s digital economy, it is essential that companies of every size can collect, store and adequately protect customer data and proprietary secrets. Failure to do so will …

arrows
Shift to microservices and continuous software delivery puts pressure on DevOps observability

A Scalyr report, based on a survey of 155 software development practitioners, finds that organizations are shifting away from traditional, monolithic architectures, with …

eye
Week in review: Masking printers’ tracking dots, anti-privacy dark patterns, and WPA3

Here’s an overview of some of last week’s most interesting news and articles: How Facebook and Google nudge users to make anti-privacy choices Facebook, Google and …

bug
Vulnerability landscape evolution for common desktop applications

Flexera released Vulnerability Review 2018: Top Desktop Apps, part of the annual report series from Secunia Research. This new edition focuses on heavily used desktop …

biohazard
Cryptocurrency miners poised for continued growth

WatchGuard threat intelligence from Q1 2018 revealed that 98.8 percent of seemingly common Linux/Downloader malware variants were actually designed to deliver a popular …

privacy
Do you support employee digital monitoring programs?

Employers can implement effective cybersecurity that increases visibility, reduces insider threat risk, and that respects employees’ privacy while gaining their support, …

Office 365
Whitepaper: Managing users and authentication with on-premises Active Directory for O365

This whitepaper is no longer available. The move to Office 365 (O365) requires IT departments to make some tough decisions regarding how and where to manage users and …

person
Cybercriminals will gravitate to criminal activity that maximizes their profit

McAfee released its McAfee Labs Threats Report: June 2018, examining the growth and trends of new malware, ransomware, and other threats in Q1 2018. McAfee Labs saw on average …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools