Image: PhotoGranary/Adobe Stock When cloud computing first became popular, it was seen as a way of reducing both friction and costs. It was much faster and cheaper to spin up a virtual... Read more »
Identity management company 1Password is spinning up a pair of new features that constitute a major shift away from passwords and toward their low-friction replacement: passkeys. Image: 1Password On June 6, 1Password... Read more »
A new study by Okta finds that a proliferation of active accounts and web identities is exacerbating security risks both for individuals and enterprises. Image: Bussarin/Adobe Stock Many individuals do not know... Read more »
Researchers at Akamai’s Security Intelligence unit find a botnet specimen that reveals how successful DDoS, spam and other cyberattacks can be done with little finesse, knowledge or savvy. Image: iStock/bagotaj Botnets, especially... Read more »
Image: pinkeyes/Adobe Stock Microsoft’s warning on Wednesday that the China-sponsored actor Volt Typhoon attacked U.S. infrastructure put a hard emphasis on presentations by cybersecurity and international affairs experts that a global war... Read more »
At its Sphere23 event in Finland, security company WithSecure unveiled offerings focused on collaboration, business goals and outcomes. Image: Getty Images/iStockphoto The WithSecure Sphere conference in Helsinki, Finland, kicked off with a... Read more »
Image: Alexander/Adobe Stock Cloudflare announced on May 15, 2023 a new suite of zero-trust security tools for companies to leverage the benefits of AI technologies while mitigating risks. The company integrated the... Read more »
With NordLocker, you can store, manage and share individual files. Learn how with this step-by-step guide. Image: Thapana_Studio/Adobe Stock If you’re looking for a secure place to store, manage and share files... Read more »
A new Linux Foundation report finds that the global focus is on cloud/containers, cybersecurity and AI/ML skills, and that upskilling is key. Image: Vadim Pastuh/Adobe Stock Even in the face of ongoing... Read more »
New BEC cyberattacks use phishing with a legitimate Dropbox link as a lure for malware and credentials theft. Image: Adobe Stock. Threat actors have added a new wrinkle to traditional business email... Read more »