Please turn on your JavaScript for this page to function normally.
Tor Browser
Tor Browser 10.5 improves circumvention for Tor users in censored places

The Tor Project has brought major censorship circumvention and usability changes to the latest release of Tor Browser. The Tor team is on a mission to make Tor easier to use …

fix
How health tech can secure patient data post-CURES Act

It’s the central conundrum at the heart of telehealth: How can patients gain access to their most vital medical records without putting privacy at risk? The question is not …

speed
Online brands prioritizing speed over security

Consumers around the world fear that businesses are now compromising online security in their efforts to deliver seamless digital experiences. According to a research released …

Good
Cybersecurity posture confidence high, yet incidents are increasing too

IronNet Cybersecurity released a report assessing timely topics such as the estimated cost per enterprise of the SolarWinds cyberattack, executive-level engagement in attack …

encryption
Enhancing cloud security with a two-step cryptography technique

The central goal of cloud computing is to provide fast, easy-to-use computing and data storage services at a low cost. However, the cloud environment comes with data …

compliance
Chief Compliance Officers must embrace new leadership responsibilities

As demands on the compliance function grow more intense, Chief Compliance Officers (CCOs) must proactively embrace new leadership responsibilities for their role and …

mobile security
Consumers neglecting mobile security despite growing number of threats

Over the past year, consumers have adapted to many changes, including the rapid shift towards a digital-first lifestyle. This has led to an emphasis on consumers dependence on …

Google Workspace
A closer look at Google Workspace privacy and data security

Google recently unveiled the next evolution of Google Workspace, including new security and privacy capabilities to help users take advantage of trusted, cloud-native …

privacy
Many companies believe it is important to protect employee privacy, yet few are effective in doing so

DTEX Systems released a report which revealed a significant workforce privacy gap. The report, conducted by the Ponemon Institute, surveyed a global pool of 1,249 IT and IT …

data
SMEs strongly positioned in the data protection sector

Small and medium-sized enterprises seem to be strongly positioned in the data protection sector, according to a recent survey of 600 German, French and British executives …

money online
Most businesses to accelerate data security investments in 2021

71 percent of enterprise executives reported their organization’s data and AI timelines have accelerated since the onset of the COVID-19 pandemic, with one in four reporting …

BYOD
Organizations ill-equipped to deal with growing BYOD security threats

Bitglass and Cybersecurity Insiders announced several findings from a report that show the rapid adoption of unmanaged personal devices connecting to work-related resources …

Don't miss

Cybersecurity news