Authentication

How privacy is moving data security to the top of corporate agendas

It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.

Why securing containers and microservices is a challenge

Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.

What to do after a data breach: 5 steps to minimize risk

Website database breaches happen, and while there's little you can do to prevent them you can minimize your exposure. Here's what to do.

5 signs you've been hit with an advanced persistent threat

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack

New Georgia law criminalizes good-faith security research, permits vigilante action

Georgia cybersecurity folks are outraged about SB 315, and warn that it could cost the state jobs.

The best privacy and security apps for Android

Forget malware scanners or over-the-top security suites: These are the apps that'll actually improve your security and protect your privacy on Android.

Supreme Court raises questions on Aadhaar based on Facebook fiasco

The Supreme Court flagged the threat of probable influence of voters in the upcoming 2019 elections using citizen information collected through Aadhaar.

Roaming Mantis: Android malware distributed through DNS hijack targets smartphones

The attackers behind the malware seek out vulnerable routers for compromise and distribute the malware by hijacking the DNS settings of infected routers. The method of router compromise remains unknown.

MS Office vulnerabilities, unexplained outage puts Microsoft in a tough spot

The biggest software company in the world, Microsoft has had a rough month with significant spikes in targeted malware attacks and an out-of-the-blue Office 365 outage that threw enterprises out of gear all over the globe. 

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

5 myths of API security

In light of Panera Bread’s API-related data breach, here what is — and isn’t — true about protecting application programming interfaces.

RSA intents to a acquire Fortscale to expand NetWitness Platform

RSA’s acquisition of Fortscale is designed to provide customers with new user and entity behavioral analytics capabilities.