August 08, 2019
States from Maine to California have recently enacted privacy, data security, cybersecurity, and data breach notification laws. Let's break down what each of these laws entails and how businesses and consumers are affected. Read more â¶
New Spectre-like CPU vulnerability bypasses existing defenses
Know your Edge Chromium security options
Famous social engineering attacks: 12 crafty cons
6 lessons from Venmoâs lax approach to API security
How attackers identify your organization's weakest links
12 tips for effectively presenting cybersecurity to the board
Digital Innovation (DI) can provide meaningful impacts for businesses of all types â companies looking for a competitive edge need to embrace DI. Read more â¶
The SWAPGS vulnerability can allow attackers to access contents of kernel memory addresses. Microsoft and Intel have coordinated on a mitigation. Read more â¶
DEALPOST
This intuitive collaboration platform is made for teams that move. Read more â¶
Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know. Read more â¶
This rogues gallery of social engineering attack examples made headlines by taking advantage of human nature. Read more â¶
Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security. Read more â¶
Understanding the techniques and tools attackers use in targeted phishing attacks. Read more â¶
Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more â¶
Cost savings and business benefits enabled by Adobe Sign. Read more â¶