Disable browser synchronization in the office
It’s common practice in many companies to keep work and personal information separate. But browser synchronization often remains unnoticed — and attackers are already exploiting it.
36 articles
It’s common practice in many companies to keep work and personal information separate. But browser synchronization often remains unnoticed — and attackers are already exploiting it.
Business is actively moving over to open-source solutions. How can the transition be made successfully, and what are the risks to consider?
Information security measures are far more effective when supported by top management. How to get this support?
Miners still pose a threat to businesses — especially ones that use cloud infrastructure.
Why the future belongs to neuromorphic processors, and how they differ from conventional processors in modern devices.
Seemingly overnight, the pandemic changed the way we work, and infosec departments are still adjusting. What’s on the horizon for employees in the coming year?
What do trading platform developers and operators need to keep in mind?
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
How to protect and control workloads in the AWS public cloud
Think you can do better than a machine-learning algorithm and hunt down threats in the making? Take our quiz and find out!
Cybersecurity is ever-changing how can executives stay ahead of the curve?
Do you know enough about DDoS attacks to ensure your company never faces one? Take our quiz and find out!
GDPR is just around the corner. Is your business prepared for it? Learn how others see GDPR and how it will change the world.
A visual representation of a problem appears just a bit more meaningful, and at the same time more comprehensible, than large sheets of texts. Here is a big (or not so big) picture of threats to medium-sized businesses.