Security

Best Internet Security Software

After more than a year of high-profile cyber attacks and now the threat of cyber war, businesses and even...

HP Wolf Security Report Shows Threat Landscape Getting Scarier

When it comes to securing PCs and Printers, HP is the most advanced of hardware vendors. This advantage is...

Microsoft Gets Rid Of Passwords: I Can Almost Hear Angels Singing

Microsoft announced this week that the company is moving away from passwords. This move may seem sudden, but I...

The Coming AI Threats We Aren’t Prepared For

Artificial intelligence, like any other tool, isn’t inherently good or bad. But AI does automate and emulate other things...

Another Crazy Week in Cybersecurity

Ever since the SolarWinds hack in December, the pace of cybersecurity attacks seems to have picked up, but lately...

Colonial Pipeline Lessons: Ransomware (and Security) Steps Everyone Should Take

From the SolarWinds hack to the Colonial Pipeline ransomware attack, cybersecurity has entered into public consciousness like never before. How...

Top Blogs

Security

Pandemic Fuels Surge in DDoS Attacks

Cybercriminals launched an unprecedented number of distributed denial-of-service (DDoS) attacks in the second half of 2020, fueled by the...

Ransomware Demands, Payments Rising Quickly, Palo Alto Says

In 2017, the WannaCry and NotPetya attacks put cybersecurity professionals and the world at large on notice that ransomware...

Docker 1.12.6 Fixes Privilege Escalation Vulnerability

From the 'Great Container Escape' files: The Docker Engine 1.12.6 release debuted on Jan. 10 as a security update for...

Y Combinator Alum Castle Takes Aim at Online Fraud

Castle graduated from the Y Combinator cyber accelerator six months ago, bringing its account takeover technology to market. The...