Pornhub’s situation underscores the persistent risks organizations face from third-party vendors—even years after ...
Microsoft has made security changes to one of the most popular tools bundled with Windows installations, and now users must ...
People trust password managers, and when that trust isn’t upheld, it can prove costly — as LastPass has just discovered.
The Cybersecurity and Infrastructure Security Agency (CISA) has issued guidance surrounding hardening your iPhone from ...
Following a reported surge in espionage activity, the agency in charge of countering cyber threats in the U.S. has updated ...
Most successful cyberattacks target end users through social engineering. They also exploit systems left vulnerable due to user errors. This is why securing the human element is crucial to managing ...
While speaking with three other information security executives on the keynote panel of a pre-pandemic ISACA conference, I mentioned that users have to be held responsible for clear policy violations.
As the landscape of modern work changes, with its distributed teams and quickly evolving cloud-based technologies, maintaining access controls is an increasingly Sisyphean task. The process of ...
It's common among cybersecurity professionals to point to the end user as a top area of risk in securing the organization. This is understandable. Systems and software are under our control, but users ...
In today’s fast-paced organizations, end-users will sometimes try to take a shortcut. We've all been there — rushing to meet a deadline, juggling multiple tasks, or just trying to be helpful. But the ...
Google is also backing these measures with a $20,000 bounty for researchers who can demonstrate successful breaches of the new security boundaries.
In Windows XP Home Edition, there are two basic types of local user accounts (in addition to the guest account): administrators and limited users. With XP Pro, things get a bit more complicated. Users ...