News of this week’s so-called MEGA BREACH might deeply trouble you. If so, that means it’s a perfect time to take control of your personal security. Yes, every company should be held responsible.
In a recent survey of industry practitioners most were unconvinced about the ability of current solutions to decrypt, inspect and then re-encrypt traffic.
If you thought passwords will soon be dead, think again. They’re here to stay — for now. Passwords are cumbersome and hard to remember — and just when you did, you’re told to change it again.
Encryption is the mathematical breakthrough that allows a message to stay secret between the person who wrote it and the person receiving it, no matter who ferries the message between the two.
Cyberattacks that bypass account lockouts are growing in popularity. Here’s how to spot and prevent them.
A password manager can not only create a super-secure password, it can remember it and use it to log
Ghostery tells us why privacy issues can help shape the future of the Internet
Admins can now significantly reduce the risk of accounts being compromised by password-spraying attacks
Three cyber threats to watch out for, unsafe dating apps and infosec job opportunities
Are you protecting the right places, the right way?