S3 Ep22: Cryptographic escapes and social media scams [Podcast]
How to stop security-conscious apps from allowing unencrypted data to escape, and how scammers put social network users under pressure in …
How to stop security-conscious apps from allowing unencrypted data to escape, and how scammers put social network users under pressure in …
Anuta Networks announced the availability of ATOM Cloud, a Software-as-a-Service (SaaS) offering of its ATOM network automation platform. …
Researchers have spotted malicious packages targeting internal applications for Amazon, Lyft, Slack and Zillow (among others) inside the …
Identity management is easiest when you can manage identities in a centralized location and use these identities across various accounts …
In this post, I will show you how teams of all sizes can gain access to world-class security in the cloud without a dedicated security …
With the voice commands “Alexa Skills,” users can load numerous extra functions onto their Amazon voice assistant. Amazon screens …
Containment is a crucial part of an overall Incident Response Strategy, as this practice allows time for responders to perform forensics, …
Jamaica’s JamCOVID app and website were taken offline late on Thursday following a third security lapse, which exposed quarantine orders …
Digital Guardian announced it significantly enhanced its relationship with Amazon Web Services (AWS) through several key initiatives and …
We continue to expand the scope of our assurance programs and are pleased to announce that eight additional services have been added to the …
The graphics card that wants you to stick to playing games, the man that didn’t weigh 100 tons after all, and the marketing gang that …
Computer security bods based in Germany and the US have analyzed the security measures protecting Amazon’s Alexa voice assistant ecosystem …