Improve your app security on Azure

Image: PhotoGranary/Adobe Stock When cloud computing first became popular, it was seen as a way of reducing both friction and costs. It was much faster and cheaper to spin up a virtual... Read more »

Threatening botnets can be created with little code experience, Akamai finds

Researchers at Akamai’s Security Intelligence unit find a botnet specimen that reveals how successful DDoS, spam and other cyberattacks can be done with little finesse, knowledge or savvy. Image: iStock/bagotaj Botnets, especially... Read more »

Microsoft warns of Volt Typhoon, latest salvo in global cyberwar

Image: pinkeyes/Adobe Stock Microsoft’s warning on Wednesday that the China-sponsored actor Volt Typhoon attacked U.S. infrastructure put a hard emphasis on presentations by cybersecurity and international affairs experts that a global war... Read more »

WithSecure launches ‘outcome-based’ security at Sphere23 conference

At its Sphere23 event in Finland, security company WithSecure unveiled offerings focused on collaboration, business goals and outcomes. Image: Getty Images/iStockphoto The WithSecure Sphere conference in Helsinki, Finland, kicked off with a... Read more »

Cloudflare releases new AI security tools with Cloudflare One

Image: Alexander/Adobe Stock Cloudflare announced on May 15, 2023 a new suite of zero-trust security tools for companies to leverage the benefits of AI technologies while mitigating risks. The company integrated the... Read more »

How to manage and share files online using NordLocker

With NordLocker, you can store, manage and share individual files. Learn how with this step-by-step guide. Image: Thapana_Studio/Adobe Stock If you’re looking for a secure place to store, manage and share files... Read more »

How business email compromise attacks emulate legitimate web services to lure clicks

New BEC cyberattacks use phishing with a legitimate Dropbox link as a lure for malware and credentials theft. Image: Adobe Stock. Threat actors have added a new wrinkle to traditional business email... Read more »

Okta’s Security Center opens window to customer insights, including threats and friction

Image: Timon/Adobe Stock Since acquiring the application team platform Auth0 in 2001, identity management company Okta has pursued a platform-neutral strategy for both internal and external consumer identity authentication that includes delivering... Read more »

IBM snags Polar Security to boost cloud data practice

IBM acquired the Israeli firm founded in 2021 to grow its relevance in the nascent realm of data security posture management, or DSPM. Image: JHVEPhoto/Adobe Stock In an effort to grow its... Read more »

Apple ID: 3 things to remember when changing this password

Image: ink drop/Adobe Stock When changing your Apple ID password — and you are changing your Apple account security passcode regularly, right? — you should prepare for the process by remembering three... Read more »