.

Security

Pushing Web Security to the Edge is Common Sense

This post was originally published by Jonathan Andresen.Not many people would argue with Thomas Edison's quote, “The three great essentials to achieve anything worthwhile...

Apple iOS 14 packed with ‘Utmost’ Mobile Security features

Apple announced its iOS 14 at the Worldwide Developers Conference on Monday and made it clear that its next version of the Operating system...

Zoom app denies end to end encryption to free users

Video Conferencing app ‘Zoom’ has made it official that it will not offer end-to-end encryption to its free users as offering ciphered communication will...

Android 11 and its Security and Privacy features

As users are already buying smartphones loaded with Android 10 OS, Google released a preview of its Android 11 operating system on February 19th...

OVERVIEW OF THE LATEST AWS SECURITY SERVICE – AMAZON DETECTIVE

This post was originally published by(ISC)² Management.Earlier this month, AWS announced that Amazon Detective is now available to all customers, reinforcing their dedication to helping customers...

Apple iPhones are vulnerable to Email hacks

Apple iPhones are vulnerable to email hackers says a Cybersecurity startup from San Francisco named ZecOps. The firm confirmed that a few Apple iPhone...

Google issues vulnerability alert to Chrome Browser users

Google has issued a security warning to all its Chrome browser users using its web access platform across Windows, Mac and Linus OSes and...

Tape the Webcam and enable Firewall tops Work-from-Home Cybersecurity tips

As soon as the world switched to a lockdown due to Coronavirus Pandemic, many IT companies initiated their employees to work from home to...

WHITE PAPER ON CLOUD SECURITY RISKS – AND HOW TO MITIGATE...

This post was originally published by(ISC)² Management.Cloud security today is touted as better than ever. So how do we explain the ever-increasing number of...

THREAT HUNTING: IS YOUR SECURITY OPERATION READY TO LAUNCH SUCH A...

This post was originally published by (ISC)² Management.It could be a blended attack as slick as a multichannel marketing campaign. Or a spontaneous crime...
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!