July 05, 2019
There are plenty of antivirus tools for Android. Here's how the top 13 measure up in protection, usability and features. Read more â¶
The dirty dozen: 12 top cloud security threats
15 real-world phishing examples â and how to recognize them
What is corporate espionage? Inside the murky world of private spying
10 things you should know about dark web websites
How SQLi attacks work and how to prevent them
New CISO appointments, June 2019
Managing Change in Java SE: So Where Are We? WBNR Read more â¶
More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read more â¶
DEALPOST
Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more â¶
How well do you know these crafty cons? Read more â¶
Companies gather intelligence on their rivals just like nation-states do. Sometimes its legal, but industrial espionage can easily slip over the line into criminality. Read more â¶
Catch a glimpse of what flourishes in the shadows of the internet. Read more â¶
SQL injection is a type of attack that can give an adversary complete control over your web application database by inserting arbitrary SQL code into a database query. Read more â¶
Find up-to-date news of CSO, CISO and other senior security executive appointments. Read more â¶
6 Step Framework for Multi-Cloud Strategy Read more â¶