Give yourself some added peace of mind by giving your Google account a thorough set of security reinforcements.
CryptoPhone users found 17 fake “cell towers” in a month, but don’t know who deployed them or why. If you think you'd know if your calls are being intercepted by seeing the phone connect to "2G," then ...
Microsoft has a fix for preventing the next CrowdStrike fiasco, but is it a good one? Maybe giving security firms access to the Windows isn’t the best idea, but freezing them out could be worse.
A hacker noticed the change in its status and hijacked the dead add-in and its 4.71-star rating to conduct a phishing campaign that the company which uncovered the attack, plug-in security company Koi ...
Fido Alliance proposes a new standard that makes it possible to use the same passkeys even if you change platform or service. Zero trust isn’t dead, but it’s often misapplied. BeyondTrust Chief ...
Employees are using AI tools every day — often without IT oversight — and it’s quietly putting sensitive business data at risk. In this episode of Today in Tech, host Keith Shaw sits down with ...
IT organizations deploy a number of strategies and frameworks to assess their organization’s risk and security posture – everything from ISO to COBIT. But while these frameworks are often helpful ...
The monitoring and security specialist has appointed the ex-Proofpoint CEO in the wake of the surprise departure of Doug Merritt last year. Fujitsu, in close partnership with ServiceNow, can help ...
What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, ...
From spotting weapons and detecting smoke to predicting where incidents are most likely to occur, artificial intelligence is reshaping the future of physical security. In this episode of Today in Tech ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results