More stories

  • in

    Beyond passwords: 4 key security steps you’re probably forgetting

    <!–> matejmo/Getty Images IT pros do threat modeling every day. That sounds like something out of a Mission: Impossible script, but it’s really just a fancy way of saying they regularly ask the question “What can go wrong?” Special Feature You can do the same to protect your online identity and your assets, and you […] More

  • in

    61% of firms worry they are unprepared for security risks in quantum era

    <!–> Eugene Mymrin/Getty Images Enterprises are worried they are ill-prepared to deal with potential cybersecurity risks brought on by quantum computing.  Some 61% have expressed concern their organization is not and will not be prepared to handle security implications that may surface in a post-quantum computing future, according to a survey conducted by Ponemon Institute. […] More

  • in

    What is ransomware? Everything you need to know and how to reduce your risk

    <!–> bagira22/Getty Images Ransomware is one of the most dangerous threats businesses and consumers face today. Whether you are an individual or a Fortune 500 company, the experience of getting locked out of your system, having your files encrypted, and being subjected to threats and demands for payment can be harrowing. Special Feature While law […] More

  • in

    Government officials debate effectiveness of multilateral relations in cybersecurity

    <!–> DKosig/Getty Images Amid continued calls for deeper global cooperation between all stakeholders to bolster cyber defense, government officials are now debating whether multilateral relations have been effective.  Digitalization has become the new engine of economic growth for many countries, with the World Bank estimating that digital economies contribute at least 15% of global GDP. This […] More

  • in

    Regulations are still necessary to compel adoption of cybersecurity measures

    <!–> Andrew Brookes/Getty Images Regulations are still necessary to make sure organizations are compelled to adopt measures designed to strengthen their cybersecurity posture. Singapore this week released guides it said will help organizations, including small- and mid-sized businesses (SMBs), better understand risks associated with using cloud services and what they, as well as their cloud […] More

  • in

    9 top mobile security threats and how you can avoid them

    <!–> Tero Vesalainen/Getty Images Today’s smartphones hold all the keys to our communications, finances, data, and social lives, which makes these ubiquitous devices lucrative targets for cybercriminals.    Special Feature Whatever smartphone you use – whether it’s an Android device from Google, Samsung, or Motorola, or an Apple iOS-based iPhone – threat actors are ever […] More

  • in

    Cybersecurity 101: Everything on how to protect your privacy and stay safe online

    <!–> Tetra Images/Getty Images “I have nothing to hide” was once a typical response to surveillance programs utilizing cameras, border checks, and questioning by law enforcement. Special Feature But now, the sheer volume of devices and technology-based “innovations” used to track us has changed the conversation. Every piece of technology in our lives – from […] More

  • in

    The top 9 mobile security threats and how you can avoid them

    <!–> Tero Vesalainen/Getty Images Today’s smartphones hold all the keys to our communications, finances, data, and social lives, which makes these ubiquitous devices lucrative targets for cybercriminals.    Special Feature Whatever smartphone you use – whether it’s an Android device from Google, Samsung, or Motorola, or an Apple iOS-based iPhone – threat actors are ever […] More