Data Protection Technology3 Min Read November 21, 2025 Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple's…
Data Protection Mobile Security3 Min Read November 21, 2025 Why IT Admins Choose Samsung for Mobile Security Ever wonder how some IT teams keep corporate data safe without slowing down employees? Of course you have. Mobile devices are essential for…
Data Protection Network Security4 Min Read November 8, 2025 Microsoft Uncovers 'Whisper Leak' Attack That Identifies AI Chat Topics in Encrypted Traffic Microsoft has disclosed details of a novel side-channel attack targeting remote language models that could enable a passive adversary with…
Cloud Security Data Protection4 Min Read November 7, 2025 Enterprise Credentials at Risk – Same Old, Same Old? Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She…
Data Protection Malware3 Min Read November 7, 2025 Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts Google on Thursday said it's rolling out a dedicated form to allow businesses listed on Google Maps to report extortion attempts made by…
Cloud Security Data Protection5 Min Read October 28, 2025 Is Your Google Workspace as Secure as You Think it is? The New Reality for Lean Security Teams If you're the first security or IT hire at a fast-growing startup, you've likely inherited a mandate…
Authentication Data Protection2 Min Read October 27, 2025 X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts Social media platform X is urging users who have enrolled for two-factor authentication (2FA) using passkeys and hardware security keys like…
Cyber Resilience Data Protection1 Min Read October 24, 2025 The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently Does your organization suffer from a cybersecurity perception gap? Findings from the Bitdefender 2025 Cybersecurity Assessment suggest the…
Artificial Intelligence Data Protection2 Min Read October 23, 2025 Secure AI at Scale and Speed — Learn the Framework in this Free Webinar AI is everywhere—and your company wants in. Faster products, smarter systems, fewer bottlenecks. But if you're in security, that…
Data Protection DevOps2 Min Read October 23, 2025 Why Organizations Are Abandoning Static Secrets for Managed Identities As machine identities explode across cloud environments, enterprises report dramatic productivity gains from eliminating static credentials.…
Data Protection Vulnerability3 Min Read October 22, 2025 TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution Cybersecurity researchers have disclosed details of a high-severity flaw impacting the popular async-tar Rust library and its forks, including…
Data Protection Penetration Testing3 Min Read October 16, 2025 Beware the Hidden Costs of Pen Testing Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach.…
Browser Security Data Protection3 Min Read October 15, 2025 How Attackers Bypass Synced Passkeys TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to deploy…
Artificial Intelligence Data Protection4 Min Read October 6, 2025 5 Critical Questions For Adopting an AI Security Solution In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security…
Artificial Intelligence Data Protection3 Min Read September 30, 2025 Evolving Enterprise Defense to Secure the Modern AI Supply Chain The world of enterprise technology is undergoing a dramatic shift. Gen-AI adoption is accelerating at an unprecedented pace, and SaaS vendors…
Data Protection4 Min Read September 3, 2025 Detecting Data Leaks Before Disaster In January 2025, cybersecurity experts at Wiz Research found that Chinese AI specialist DeepSeek had suffered a data leak, putting more than 1…
Data Protection Enterprise Security3 Min Read August 28, 2025 The 5 Golden Rules of Safe AI Adoption Employees are experimenting with AI at record speed. They are drafting emails, analyzing data, and transforming the workplace. The problem is…
Cloud Security Data Protection4 Min Read August 25, 2025 Vegas, Vulnerabilities, and Voices: Black Hat and Squadcon 2025 The week of August 4th, I had the opportunity to attend two exciting conferences in the cybersecurity world: Black Hat USA 2025 and Squadcon…
Business Continuity Data Protection6 Min Read August 25, 2025 From Impact to Action: Turning BIA Insights Into Resilient Recovery Modern businesses face a rapidly evolving and expanding threat landscape, but what does this mean for your business? It means a growing number…